heroui logo

Network Connection Initiated To BTunnels Domains

Sigma Rules

View Source
Summary
This rule detects network connections initiated by a process on Windows systems to domains associated with BTunnels (.btunnel.co.in). BTunnels can be exploited by attackers to create reverse shells or maintain persistence on compromised machines. The rule tracks network traffic where a process attempts to connect to these malicious domains, highlighting potential exfiltration attacks. The detection utilizes the 'Initiated' flag set to true and checks if the destination hostname ends with '.btunnel.co.in'. Legitimate applications may also use BTunnels, leading to potential false positives. This rule is part of an effort to monitor suspicious network activities and provide alerts for further investigation.
Categories
  • Network
  • Endpoint
Data Sources
  • Network Traffic
  • Application Log
Created: 2024-09-13