
Summary
The 'IPv4/IPv6 Forwarding Activity' detection rule targets malicious command execution that enables IP forwarding on Linux systems, a technique often exploited by attackers to facilitate network traffic routing, potentially allowing data exfiltration or command and control communications. The rule leverages EQL (Event Query Language) to examine process events for specific command patterns indicative of IP forwarding operations. It is focused on identifying instances where a user might enable IPv4 or IPv6 forwarding using common system tools, while ensuring legitimacy by filtering out benign process executions from recognized system utilities. The risk score of 21 indicates low severity; however, context and correlation analysis are crucial in distinguishing between administrative and malicious activities. The rule provides extensive investigation guidance, including response recommendations and false positive analysis, to help security professionals determine the legitimacy of detected activities.
Categories
- Endpoint
- Linux
- Other
Data Sources
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1572
Created: 2024-11-04