
Summary
This detection rule identifies suspicious Plink port forwarding activities that could indicate unauthorized tunneling attempts to bypass network restrictions. Plink is a command-line interface to the PuTTY backend, often used for SSH connections. The rule specifically looks for processes that contain a command-line argument indicating remote port forwarding (-R) which can be exploited for command and control (C2) actions by attackers. By monitoring process creation events on Windows systems, the rule aims to flag potential lateral movement or remote access risks associated with such command-line executions. High false positive rates may occur during legitimate administrative activities that utilize port forwarding for remote access purposes, necessitating careful analysis and tuning based on the environment.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2021-01-19