Techniques
Sample rules
Curl SOCKS Proxy Detected via Defend for Containers
- source: elastic
- technicques:
- T1572
Description
This rule detects the use of the “curl” command-line tool with SOCKS proxy options. Attackers may use “curl” to establish a SOCKS proxy connection to bypass network restrictions and exfiltrate data or communicate with C2 servers.
Detection logic
process where host.os.type == "linux" and event.type == "start" and event.action == "exec" and
process.name == "curl" and process.args like ("--socks5-hostname", "--proxy", "--preproxy", "socks5*", "-x") and
process.interactive == true and container.id like "?*"