
Summary
This detection rule is focused on identifying outbound connections to potentially abusive file sharing and pastebin-style domains, which are commonly exploited by adversaries for a variety of malicious activities such as malware delivery, data exfiltration, or command and control (C2) communications. By analyzing logs from Cisco Secure Firewall Threat Defense, specifically targeting allowed connections, the rule incorporates a list of known domains typically associated with these activities. The rule is particularly relevant as many of the domains also serve legitimate purposes, which makes them attractive to attackers wanting to blend in. If connections to these domains are confirmed as malicious, they can signify initial attack vectors like tool staging or sensitive data leaks. The rule includes guidance for implementation, highlighting the necessity of configuring the associated logs in a Splunk environment as well as identifying known false positives that may arise from legitimate user activity.
Categories
- Network
- Cloud
- Web
Data Sources
- Cloud Service
- Network Traffic
- Application Log
ATT&CK Techniques
- T1071.001
- T1090.002
- T1105
- T1567.002
- T1588.002
Created: 2025-04-01