heroui logo

Linux Iptables Firewall Modification

Splunk Security Content

View Source
Summary
This detection rule is designed to identify suspicious modifications to the iptables firewall settings on Linux systems, specifically monitoring for command-line activities that adjust firewall rules to open certain TCP ports. By leveraging data from Endpoint Detection and Response (EDR) agents, the rule targets specific command patterns indicative of potentially malicious activities, such as those linked to malware like CyclopsBlink. The ability of malware to alter firewall settings poses a significant risk as it can enable unauthorized access to systems and facilitate communication with Command and Control (C2) servers. The rule identifies command-line executions where processes such as 'iptables' are used in a particular syntax to accept traffic on designated ports and requires confirmation of malicious intent to be actionable, which could otherwise lead to persistent access and data exfiltration by attackers.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Application Log
  • Process
ATT&CK Techniques
  • T1562.004
  • T1562
Created: 2025-01-27