
Summary
This rule is designed to detect potentially suspicious activity related to file uploads via curl on Linux systems. Curl is a widely used command-line tool for transferring data via various protocols, including HTTP. The rule triggers when a process related to curl is started, specifically looking for command-line parameters associated with file uploads. It checks for specific patterns in the command line that indicate the use of curl's file transfer functionalities, such as ' --form', ' --upload-file', or ' --data'. Additionally, the rule includes a condition that ensures the detection logic only applies to external addresses, ignoring localhost operations to reduce false positives related to benign script operations by developers. This detection aids in identifying potential data exfiltration attempts by malicious actors using curl, which is often employed in attack scenarios, making this a critical rule for ensuring the security of sensitive information on Linux-hosted systems.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
ATT&CK Techniques
- T1105
Created: 2022-09-15