heroui logo

Detect web traffic to dynamic domain providers

Splunk Security Content

View Source
Summary
This detection rule identifies web traffic directed to dynamic DNS providers, which are often used for malicious purposes such as running botnets, hosting malware, or conducting phishing campaigns. The detection logic utilizes Splunk's web data model, querying web traffic logs for HTTP connections resulting in a 200 status code. By analyzing the source, destination, and status of web connections, it aggregates counts of URLs while considering only those from recognized dynamic DNS providers. The underlying search leverages a lookup file (`dynamic_dns_providers_default.csv`) that contains a list of known dynamic DNS domains. It is crucial for analysts to keep this lookup file updated to enhance the rule's effectiveness.
Categories
  • Network
Data Sources
  • Web Credential
  • Network Traffic
ATT&CK Techniques
  • T1071.001
Created: 2024-11-14