
Summary
The Cisco NVM - Suspicious Download From File Sharing Website detection rule is designed to identify potentially harmful downloads from well-known file sharing and content delivery platforms. It focuses on the usage of living-off-the-land binaries (LOLBins), such as curl.exe, certutil.exe, and powershell.exe, which are frequently exploited by adversaries to obtain malicious payloads from various hosting services like GitHub and Transfer.sh. By correlating network flow data from Cisco's Network Visibility Module with contextual process information—including command-line arguments and parent process data—the rule detects suspicious activity indicative of initial access or command-and-control operations. Potential false positives include legitimate uses of these tools by administrators or developers, thus requiring careful review and tuning of the rule with domain allowlisting where necessary. This ensures detection fidelity while minimizing the impact on normal operations.
Categories
- Endpoint
- Network
Data Sources
- Network Traffic
- Application Log
ATT&CK Techniques
- T1197
Created: 2025-07-01