heroui logo

Suspicious Curl Network Connection

Splunk Security Content

View Source
Summary
The 'Suspicious Curl Network Connection' detection rule identifies potentially malicious activity involving the curl command, particularly when it contacts remote domains such as s3.amazonaws.com, which may indicate Command and Control (C2) interactions or the downloading of malicious payloads. This analytic utilizes data from Endpoint Detection and Response (EDR) agents, focusing on event logs related to process execution and command-line arguments. Given that the activity could be symptomatic of MacOS adware or other types of malware, its detection is crucial for preventing unauthorized persistence and data exfiltration. Confirmation of such activity points to possible compromise, granting attackers enduring access and the capability to deploy further malicious components.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1105
Created: 2024-11-13