
Summary
The detection rule titled "Cloudflared Tunnel Execution" is designed to identify the execution of the "cloudflared" command line tool on Windows systems. This tool is used to create secure tunnels to applications in the cloud by establishing a connection to Cloudflare's network. The rule targets command line invocations that include specific flags associated with configuring tunnels and authenticating connections, which are commonly exploited by threat actors to maintain persistent access to compromised environments. The pattern of usage is particularly concerning as it can signify that attackers are leveraging cloud connectivity tools to facilitate command-and-control operations or further lateral movement within compromised networks. This rule incorporates conditions that specifically look for command line arguments such as "-config", "-token", and more, which are indicative of tunnel setup and remote access. While the rule is tuned for prevention and detection of potentially malicious activity, it acknowledges the existence of false positives that could arise from legitimate uses of the Cloudflared tool.
Categories
- Cloud
- Infrastructure
- Endpoint
- Application
- Network
Data Sources
- Process
Created: 2023-05-17