heroui logo

Uncommon DNS Request via Bun or Node.js

Elastic Detection Rules

View Source
Summary
This rule detects uncommon DNS queries initiated by Bun or Node.js processes on endpoints across Linux, macOS, and Windows. It targets supply-chain compromise scenarios where attacker-controlled developer tooling or compromised packages trigger DNS lookups for exfiltration or C2 chatter. The detection fires when a network event shows event.category: network, host.os.type is Linux/macOS/Windows, event.action: lookup_requested, and process.name matches bun, bun.exe, node, node.exe, or nodejs, with a DNS query name that is not localhost. It uses a new_terms approach to flag newly observed terms in host.id and dns.question.name within the last seven days (history_window_start: now-7d). The rule is triggered by events ingested within a recent window (from: now-9m) and marked with event.ingested timestamp override. It maps to MITRE ATT&CK Command and Control (TA0011), specifically Web Service (T1102) and Application Layer Protocol with DNS (T1071/T1071.004). The query is expressed in kuery and focuses on network activity tied to common dev tooling. The risk is labeled low with a risk_score of 21, recognizing potential false positives in legitimate development activity. This rule helps detect attempts to abuse Bun/Node.js DNS lookups for covert data transfer or C2 communication.
Categories
  • Endpoint
  • Linux
  • macOS
  • Windows
Data Sources
  • Network Traffic
  • Process
ATT&CK Techniques
  • T1102
  • T1071
  • T1071.004
Created: 2026-05-21