heroui logo

Cisco NVM - Webserver Download From File Sharing Website

Splunk Security Content

View Source
Summary
The detection rule, developed by Nasreddine Bencherchali for use with Splunk, targets suspicious outbound connections initiated by webserver processes such as `httpd.exe`, `nginx.exe`, and `tomcat.exe`. These processes should not typically engage in outbound downloads, especially to dynamic or anonymous file-sharing services (e.g., GitHub, Discord CDN, Transfer.sh). Such behavior often indicates server compromise, wherein an attacker can use various tools to exploit and maintain access to the server by downloading malware or other tools post-exploitation. The rule leverages data from Cisco's Network Visibility Module, enriched with process context, to identify these unusual connections effectively. Additionally, it incorporates mechanisms to filter out known false positives and is tailored for use within Cisco Endpoint Security Analytics (CESA) in Splunk environments. The analysis aims to pinpoint connections where web servers are performing these unnecessary downloads, thus helping administrators respond promptly to potential threats.
Categories
  • Network
  • Endpoint
  • Cloud
  • Web
Data Sources
  • Pod
  • Container
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1105
  • T1190
Created: 2025-07-01