
Summary
The 'Cisco Secure Firewall - Wget or Curl Download' detection rule targets suspicious outbound connections made by command-line utilities such as curl and wget. It analyzes Cisco Secure Firewall Threat Defense logs to detect allowed connections (action=Allow) where the EVE_Process indicates the usage of these tools. While these utilities are typically used for legitimate purposes, such as software updates, adversaries can exploit them to download malware or establish command-and-control infrastructure. Therefore, this analytic serves as an early-warning mechanism for potential download phases in an attack framework. The detection searches for connections that may indicate malicious use, aiming to empower security operations to identify threats linked to unwanted downloads.
Categories
- Network
- Cloud
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1053.003
- T1059
- T1071.001
- T1105
Created: 2025-04-01