heroui logo

Netcat Listener Established Inside A Container

Elastic Detection Rules

View Source
Summary
This detection rule identifies established netcat listeners running inside a container, which may indicate unauthorized access, backdoor establishment, or data exfiltration. Netcat is a versatile tool for network communications, but its usage in this context can signify potential malicious activity. The detection leverages process events specifically targeting netcat-related commands like 'nc', 'ncat', and their variations, especially when used in conjunction with arguments indicative of a listening state, such as '-l', '--listen', or custom ports. Due to its dual-use nature, the rule could trigger false positives during legitimate troubleshooting or network diagnostics, necessitating careful investigation of each alert. Essentially, this rule aims to enhance container security by proactively flagging suspicious network behaviors that could stem from compromise, giving security teams critical insights into the container's network activity and overall integrity.
Categories
  • Containers
  • Cloud
  • Infrastructure
Data Sources
  • Container
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2023-04-26