heroui logo

File Transfer or Listener Established via Netcat

Elastic Detection Rules

View Source
Summary
The detection rule identifies potential malicious usage of the Netcat utility on Linux systems, which is commonly employed by attackers as a tool for establishing reverse or bind shells, facilitating unauthorized access and file transfers. The rule uses an EQL sequence to track the execution of Netcat processes and their associated network activity, identifying typical command patterns that suggest malicious intent, including scenarios like listing ports, executing commands via shell, and establishing network connections. By monitoring for such activity, security teams can mitigate risks associated with unauthorized file transfers and network commands that could indicate a breach or data exfiltration attempt. This rule recognizes the dual-use nature of Netcat, acknowledging legitimate uses while flagging suspicious executions for further investigation.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2020-02-18