heroui logo

DNS Exfiltration Using Nslookup App

Splunk Security Content

View Source
Summary
The detection rule identifies potential DNS exfiltration activities using the `nslookup` application, which attackers may leverage to extract sensitive data. By focusing on specific command-line parameters associated with `nslookup`—such as query types (TXT, A, AAAA) and retry options—the rule detects suspicious behavior typically associated with attempts to communicate with Command and Control (C2) servers or exfiltrate data. The detection is powered by Endpoint Detection and Response (EDR) telemetry, specifically examining process execution logs. Ay confirmed malicious use of this behavior could lead to data breaches and unauthorized access to sensitive information.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Process
  • Command
ATT&CK Techniques
  • T1048
  • T1048.003
Created: 2024-12-10