
Summary
This detection rule monitors network traffic to identify the usage of known remote access software such as AnyDesk, GoToMyPC, LogMeIn, and TeamViewer. Leveraging Palo Alto's network traffic logs integrated with the Splunk data model 'Network_Traffic', the rule assesses the traffic for signs of unauthorized remote access that adversaries often use to maintain control over compromised environments. The threat posed by these tools includes potential remote control of systems, data exfiltration, and deployment of additional malware, which can be catastrophic for organizational security. This rule aims to flag such activity and assist in the timely detection and response to potential threats.
Categories
- Network
- Cloud
- Endpoint
Data Sources
- Pod
- Container
- Network Traffic
- Cloud Service
ATT&CK Techniques
- T1219
Created: 2024-11-15