
Summary
The PowerShell ICMP Exfiltration rule is designed to identify potential data exfiltration attempts that utilize the Internet Control Message Protocol (ICMP) as a channel for data theft. This rule targets scenarios where attackers exploit PowerShell scripts to send data packets using ICMP echo requests (pings), a method that may circumvent traditional security controls by masquerading as legitimate network traffic. The detection relies on the presence of specific PowerShell commands that create network objects and send data over the ICMP protocol. To leverage this detection effectively, Script Block Logging must be enabled in the Windows environment, allowing for detailed tracking of PowerShell command executions. This detection rule is classified as medium severity, indicating it warrants further investigation but may also have legitimate uses in a controlled environment.
Categories
- Endpoint
- Windows
- Network
Data Sources
- Script
- Network Traffic
ATT&CK Techniques
- T1048.003
Created: 2020-10-10