
Summary
The detection rule for Rclone execution aims to identify unauthorized usage of Rclone, a command-line utility often leveraged by threat actors for data exfiltration from compromised systems to cloud storage services. Various advanced persistent threat groups, including ALPHV/BlackCat, BlackMatter, and DarkSide, are known to utilize Rclone in their operations. The Splunk query in this rule monitors processes related to Rclone's execution by utilizing several data types, particularly focusing on execution events (`execve`) and process titles, gathering logs from batch histories. The rule aggregates recorded instances of this application on a timeline, allowing security teams to analyze potential exfiltration activities. The associated techniques relate to various methods of data exfiltration, showcasing the necessity for vigilance against this versatile tool when observed in unexpected contexts.
Categories
- Endpoint
- Cloud
- Linux
Data Sources
- Process
- File
ATT&CK Techniques
- T1567.002
- T1030
- T1048.003
Created: 2024-02-09