heroui logo

Cisco NVM - Rclone Execution With Network Activity

Splunk Security Content

View Source
Summary
This detection rule captures the execution of the command-line utility 'rclone,' used for synchronizing files to remote storage. Leveraging data from Cisco Network Visibility Module (NVM) flow logs, the rule focuses on identifying suspicious usage patterns indicative of malicious activities. Valid use of rclone is legitimate, yet its frequent exploitation by threat actors for stealthy data exfiltration necessitates close monitoring. The rule inspects both the process name and associated arguments, flagging any execution with unusual or suspect flags such as 'copy,' 'remote,' or specific cloud service identifiers. If the predefined conditions are met, they suggest potential malicious behavior that warrants further investigation. Implementation of this rule involves configuring Splunk to parse NVM flow data accurately and applying appropriate filters to reduce false positives. The detection requirements include an understanding of legitimate operational contexts to gloss over unfounded alarms while ensuring necessary user monitoring for cloud abuse and data breaches.
Categories
  • Endpoint
  • Network
Data Sources
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1567.002
Created: 2025-07-03