heroui logo

Communication To Ngrok Tunneling Service Initiated

Sigma Rules

View Source
Summary
This detection rule identifies potential malicious activity by monitoring for executable files that initiate network connections to specific ngrok tunneling domains. Ngrok is often exploited by attackers to set up remote access or exfiltrate data through secure tunnels, which can obscure the nature of the traffic to evade traditional detection mechanisms. The rule flags outbound connections to known ngrok domains (e.g., tunnel.us.ngrok.com) as they can indicate either improper data exfiltration processes or the downloading of second-stage malware payloads. While there may be legitimate uses for ngrok, the context in which it is used is critical for determining whether such connections should be considered suspicious. The average user or application typically does not require access to construction tunneling domains, making this a high-priority detection rule.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Network Traffic
  • Process
Created: 2022-11-03