heroui logo

Network Connection to OAST Domain via Script Interpreter

Elastic Detection Rules

View Source
Summary
This detection rule identifies instances where package services (like npm, pip, and RubyGems) or script interpreters (including Python, Ruby, and Perl) make outbound connections to an OAST (Out-of-band Application Security Testing) domain. Threat actors exploit OAST domains for data exfiltration and command and control operations by utilizing compromised systems to send sensitive data to these domains through malicious packages. By monitoring network behavior originating from these script interpreters, this rule aims to detect potential unauthorized activities or exploitation attempts that utilize OAST services, which can include well-known platforms such as interact.sh and burpcollaborator.net. The rule leverages Elastic Query Language (EQL) to track relevant events in endpoint logs, focusing on macOS environments. Its risk score is set at 73, indicating a high level of threat, thereby requiring swift analysis and action if triggered. Investigative measures recommended include validating if ongoing authorized security testing might legitimize AOST domain connections, along with various steps for analysis and response concerning potential data exfiltration or exploitation activities.
Categories
  • Endpoint
  • macOS
Data Sources
  • Network Traffic
  • Process
ATT&CK Techniques
  • T1102
  • T1567
Created: 2026-01-30