heroui logo

DNS TOR Proxies

Sigma Rules

View Source
Summary
This detection rule identifies potential usage of TOR proxies by monitoring DNS lookups for certain associated domains. By checking for queries directed towards well-known TOR-related URLs, especially those that are frequently utilized to access the TOR network, system administrators can gain insights into possible attempts to exfiltrate data or anonymize outgoing traffic. This behavior often signifies potential malicious activity or intent to hide actions within the network. Given that TOR is used for anonymity, identifying these DNS lookups can help organizations spot abusive behavior or unauthorized access attempts which may compromise network integrity. The detection specifically looks for DNS queries against a list of domains connected to TOR proxies, leveraging dns service logs from zeek to accurately flag these unusual activities.
Categories
  • Network
  • Endpoint
  • Cloud
  • On-Premise
Data Sources
  • Network Traffic
  • Application Log
  • Logon Session
Created: 2021-08-15