heroui logo

Deprecated - Potential DNS Tunneling via Iodine

Elastic Detection Rules

View Source
Summary
The rule 'Deprecated - Potential DNS Tunneling via Iodine' aims to detect the usage of the Iodine tool, which can tunnel IPv4 traffic through the DNS protocol. This can potentially allow attackers to circumvent firewalls and evade detection mechanisms, posing significant security risks. Given that the normal usage of Iodine is rare, except in security testing environments, its detection is flagged as high risk. The rule is applicable for Linux operating systems and operates by monitoring process events associated with 'iodine' or 'iodined.' The detection mechanism relies on querying the event data for specific process starts related to Iodine. As of the current update, this rule is marked as deprecated because its logic has been integrated into a broader rule focusing on potential Linux tunneling activities. It's significant to note that while it might generate false positives, the circumstances in which Iodine is used outside of test environments are highly limited, thereby lowering the likelihood of common benign use cases triggering this detection.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
ATT&CK Techniques
  • T1572
Created: 2020-02-18