Detectionmediumtest

Network Connection Initiated To Cloudflared Tunnels Domains

Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Kamran Saifullah, Nasreddine Bencherchali (Nextron Systems)Created Mon May 277cd1dcdc-6edf-4896-86dc-d1f19ad64903windows
Log Source
WindowsNetwork Connection
ProductWindows← raw: windows
CategoryNetwork Connection← raw: network_connection

Events for outbound and inbound network connections including DNS resolution.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        Initiated: 'true'
        DestinationHostname|endswith:
            - '.v2.argotunnel.com'
            - 'protocol-v2.argotunnel.com'
            - 'trycloudflare.com'
            - 'update.argotunnel.com'
    condition: selection
False Positives

Legitimate use of cloudflare tunnels will also trigger this.

Rule Metadata
Rule ID
7cd1dcdc-6edf-4896-86dc-d1f19ad64903
Status
test
Level
medium
Type
Detection
Created
Mon May 27
Path
rules/windows/network_connection/net_connection_win_domain_cloudflared_communication.yml
Raw Tags
attack.exfiltrationattack.command-and-controlattack.t1567attack.t1572
View on GitHub