
Summary
This detection rule identifies attempts by executables to access ngrok tunneling services on Linux systems. The presence of communication with ngrok, an external tunneling service, may indicate unauthorized data exfiltration or the use of a command-and-control (C2) channel by malicious actors. The rule specifically looks for any network connections to common ngrok domains, which serve as endpoints for creating secure tunnels. By monitoring this behavior, security teams can detect potential breaches where sensitive data might be at risk of being exfiltrated through these channels. The rule has been authored by Florian Roth of Nextron Systems and emphasizes the need for vigilance against potential risks associated with tunneling services.
Categories
- Linux
- Network
Data Sources
- Network Traffic
Created: 2022-11-03