heroui logo

DropBox API Traffic

Anvilogic Forge

View Source
Summary
This detection rule is designed to monitor and identify any traffic directed to Dropbox API endpoints. It is particularly useful in scenarios where Dropbox is leveraged for command-and-control (C2) communications or potential data loss prevention (DLP) violations. The rule utilizes regex matching for URLs related to Dropbox, specifically targeting `content.dropboxapi.com`, `api.dropboxapi.com`, and `dl.dropboxusercontent.com`. The collected web traffic data includes timestamps, host identifiers, user information, URI paths, user-agent strings, as well as the source and destination IP addresses. Additionally, the rule enriches the results with geolocation information based on the destination IP, which aids in further contextualizing the data. Threat actor associations like APT29, Cozy Bear, and other groups known for utilizing cloud services for exfiltration are noted in this detection, highlighting the relevance and significance of identifying such API traffic.
Categories
  • Cloud
  • Web
  • Network
Data Sources
  • Web Credential
  • Network Traffic
  • Internet Scan
ATT&CK Techniques
  • T1071
  • T1567.002
Created: 2024-02-09