Rules Contributing to ICMP Based Exfiltration or Tunneling Alert
The following rules are used to identify data exfiltration attempts over ICMP protocol. Any one or more of these will trigger the ICMP Based Exfiltration or Tunneling Alert. Details for each rule can be viewed by clicking the More Details link in the description.
Title |
Description |
||||||||
---|---|---|---|---|---|---|---|---|---|
ICMP Based Exfiltration or Tunneling |
Detects Exfiltration Over Alternative Protocol - ICMP. Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. More details
Rule IDQuery{'selection_protocol': {'appid_name': 'icmp'}, 'selection_exfiltration': {'metadata|contains': ["tunneling': 2", "tunneling': 1"]}, 'selection_unreachable': {'metadata|contains': 'unreachable'}, 'condition': 'selection_protocol and selection_exfiltration and not selection_unreachable'} Log SourceStellar Cyber Network Events configured for:
Rule SourceDeveloped internally by Stellar Cyber Tactics, Techniques, and ProceduresReferences
N/A
Severity50 Suppression Logic Based On
Additional Information
|