
Summary
This detection rule is designed to monitor potential unauthorized communication attempts via the Chisel client utility, which allows attackers to create TCP and UDP tunnels, thereby establishing covert communication channels. The rule uses a sequence detection method that looks for specific command line arguments that are indicative of the Chisel client, configured to run in conjunction with unusual network activity. The connection attempts are monitored through the analysis of logs from the specified data sources. If identified, this behavior can point to attempts of protocol tunneling, which may lead to unapproved access to sensitive systems. To fully utilize this detection, the Elastic Defend integration and proper event logging must be set up, allowing the correlation of process execution and network events within a specified timeframe. The rule integrates investigative steps using Osquery to ascertain user activity and environment context. Mitigation strategies involve understanding user and activity context to minimize false positives while enabling effective threat response and incident management measures.
Categories
- Network
- Endpoint
- Linux
Data Sources
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1572
Created: 2023-08-23