
Summary
This detection rule focuses on identifying the execution of suspicious processes commonly used by attackers on web servers. It utilizes the Splunk data model `Endpoint.Processes` to monitor specific process names like `whoami`, `ping`, `iptables`, `wget`, `service`, and `curl` which are indicative of reconnaissance, persistence, or potential data exfiltration efforts. The detection is critical as it helps in early identification of potentially malicious activities that could lead to serious security incidents such as data theft, malware deployment, or ransomware attacks. When this rule is triggered, it prompts an immediate investigation to ascertain the legitimacy of the observed activities. The implementation requires ingesting detailed logs from Endpoint Detection and Response (EDR) agents to capture the relevant process executions and their associated metadata. It is essential to process these logs through specific Splunk Technology Add-ons and ensure that they are correctly mapped to the Endpoint data model for effective detection and response.
Categories
- Endpoint
- Web
Data Sources
- Process
- Application Log
ATT&CK Techniques
- T1082
Created: 2025-01-21