heroui logo

Potential Data Exfiltration Through Wget

Elastic Detection Rules

View Source
Summary
The detection rule named "Potential Data Exfiltration Through Wget" aims to identify the suspicious use of the `wget` utility on Linux systems for the purpose of uploading files to external internet servers. This behavior is indicative of attempted data exfiltration by threat actors who often collect sensitive information from compromised systems and send it back to command and control (C2) servers. While the use of `wget` itself is not malicious, its application with specific arguments (`--post-file` and `--body-file`) raises red flags, suggesting potentially abnormal and dangerous activity. The rule employs the EQL (Event Query Language) to monitor various data sources, including Elastic Defend, to catch process executions that match the defined criteria. Security teams utilizing this rule should be aware of the contextual factors surrounding the `wget` usage to ascertain whether it constitutes an actual threat or benign behavior, especially in environments where `wget` may be used legitimately for tasks such as file retrieval or updates. The rule offers a risk score of 47 against a medium severity classification, highlighting its relevance in threat detection frameworks.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Application Log
  • Cloud Service
  • User Account
  • Network Traffic
ATT&CK Techniques
  • T1048
Created: 2026-01-07