Detectionmediumtest
Cloudflared Tunnels Related DNS Requests
Detects DNS requests to Cloudflared tunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Wed Dec 20a1d9eec5-33b2-4177-8d24-27fe754d0812windows
Log Source
WindowsDNS Query
ProductWindows← raw: windows
CategoryDNS Query← raw: dns_query
DNS lookup events generated by endpoint monitoring tools.
Detection Logic
Detection Logic1 selector
detection:
selection:
QueryName|endswith:
- '.v2.argotunnel.com'
- 'protocol-v2.argotunnel.com'
- 'trycloudflare.com'
- 'update.argotunnel.com'
condition: selectionFalse Positives
Legitimate use of cloudflare tunnels will also trigger this.
References
1
Resolving title…
guidepointsecurity.com2
Resolving title…
Internal ResearchMITRE ATT&CK
Tactics
Techniques
Sub-techniques
Rule Metadata
Rule ID
a1d9eec5-33b2-4177-8d24-27fe754d0812
Status
test
Level
medium
Type
Detection
Created
Wed Dec 20
Path
rules/windows/dns_query/dns_query_win_cloudflared_communication.yml
Raw Tags
attack.command-and-controlattack.t1071.001attack.t1572