heroui logo

File Download or Read to Pipe Execution

Splunk Security Content

View Source
Summary
The 'File Download or Read to Pipe Execution' detection rule is designed to identify when utilities from various operating systems such as Windows, Linux, or macOS are used to download or read files and then execute them via a pipe to a shell. This behavior is often linked to threats including coin miners and exploits like CVE-2021-44228 affecting Log4j, potentially granting attackers the ability to execute arbitrary code, compromise systems, or access sensitive data. The rule utilizes data collected from Endpoint Detection and Response (EDR) systems, focusing on command-line activities to improve detection accuracy and limit false positives.
Categories
  • Endpoint
  • Windows
  • Linux
  • macOS
Data Sources
  • Pod
  • File
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1105
Created: 2025-10-16