heroui logo

Connection Proxy

Sigma Rules

View Source
Summary
This detection rule identifies when a proxy configuration is being set in a Linux environment through process creation events. The rule specifically looks for command line arguments that include 'http_proxy=' or 'https_proxy=', which are commonly used to configure network proxy settings. These might indicate attempts to redirect network traffic through an external server, potentially for malicious purposes such as data exfiltration or evading security measures. Given the context, the rule serves as an early warning sign for potential defense evasion activities targeting Linux systems. It is important to note that legitimate administrative tasks may produce false positives, hence the level of concern is marked as low. This rule is a part of the larger MITRE ATT&CK framework under technique T1090, which pertains to Proxy Use.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1090
Created: 2020-06-17