Rule Library

Sigma Rules

121 rules found for "exfiltration"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Github Fork Private Repositories Setting Enabled/Cleared

Detects when the policy allowing forks of private and internal repositories is changed (enabled or cleared).

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectionlowexperimental

GitHub Repository Pages Site Changed to Public

Detects when a GitHub Pages site of a repository is made public. This usually is part of a publishing process but could indicate or lead to potential unauthorized exposure of sensitive information or code.

githubaudit
TA0009 · CollectionTA0010 · ExfiltrationT1567.001 · Exfiltration to Code Repository
Ivan SaakovSat Oct 18application
Detectionmediumtest

Github Repository/Organization Transferred

Detects when a repository or an organization is being transferred to another location.

githubaudit
TA0003 · PersistenceTA0010 · ExfiltrationT1020 · Automated ExfiltrationT1537 · Transfer Data to Cloud Account
Romain GaillardMon Jul 29application
Detectionhightest

OpenCanary - FTP Login Attempt

Detects instances where an FTP service on an OpenCanary node has had a login attempt.

opencanaryapplication
TA0001 · Initial AccessTA0010 · ExfiltrationTA0008 · Lateral MovementT1190 · Exploit Public-Facing Application+1
Security Onion SolutionsFri Mar 08application
Detectionhightest

OpenCanary - TFTP Request

Detects instances where a TFTP service on an OpenCanary node has had a request.

opencanaryapplication
TA0010 · ExfiltrationT1041 · Exfiltration Over C2 Channel
Security Onion SolutionsFri Mar 08application
Detectionmediumtest

Suspicious SQL Query

Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields

database
TA0010 · ExfiltrationTA0001 · Initial AccessTA0004 · Privilege EscalationTA0003 · Persistence+2
@juju4Tue Dec 27category
Detectionhightest

Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure

Detects when an instance identity has taken an action that isn't inside SSM. This can indicate that a compromised EC2 instance is being used as a pivot point.

AWScloudtrail
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0001 · Initial AccessTA0003 · Persistence+2
jamesc-grafanaThu Jul 11cloud
Detectionlowtest

AWS EC2 VM Export Failure

An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.

AWScloudtrail
TA0009 · CollectionT1005 · Data from Local SystemTA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Diogo BrazThu Apr 16cloud
Detectionmediumtest

AWS RDS Master Password Change

Detects the change of database master password. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionhighexperimental

Modification or Deletion of an AWS RDS Cluster

Detects modifications to an RDS cluster or its deletion, which may indicate potential data exfiltration attempts, unauthorized access, or exposure of sensitive information.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Ivan SaakovFri Dec 06cloud
Detectionhightest

Restore Public AWS RDS Instance

Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.

AWScloudtrail
TA0010 · ExfiltrationT1020 · Automated Exfiltration
falokerWed Feb 12cloud
Detectionlowtest

AWS S3 Data Management Tampering

Detects when a user tampers with S3 data management in Amazon Web Services.

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerSat Jul 24cloud
Detectionmediumtest

AWS Snapshot Backup Exfiltration

Detects the modification of an EC2 snapshot's permissions to enable access from another account

AWScloudtrail
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Darin SmithMon May 17cloud
Detectionmediumtest

Multifactor Authentication Denied

User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
AlertIQThu Mar 24cloud
Detectionmediumtest

Data Exfiltration to Unsanctioned Apps

Detects when a Microsoft Cloud App Security reported when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.

Microsoft 365threat_management
TA0010 · ExfiltrationT1537 · Transfer Data to Cloud Account
Austin SongerMon Aug 23cloud
Detectionlowtest

Suspicious Inbox Forwarding

Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.

Microsoft 365threat_management
TA0010 · ExfiltrationT1020 · Automated Exfiltration
Austin SongerSun Aug 22cloud
Detectionmediumtest

Suspicious OAuth App File Download Activities

Detects when a Microsoft Cloud App Security reported when an app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual for the user.

Microsoft 365threat_management
TA0010 · Exfiltration
Austin SongerMon Aug 23cloud
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionmediumtest

Data Exfiltration with Wget

Detects attempts to post the file with the usage of wget utility. The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.

Linuxauditd
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Pawel MazurThu Nov 18linux
Detectionlowtest

Split A File Into Pieces - Linux

Detection use of the command "split" to split files into parts and possible transfer.

Linuxauditd
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+1Thu Oct 15linux
Detectionhightest

Communication To Ngrok Tunneling Service - Linux

Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors

LinuxNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03linux
Detectionmediumexperimental

Python WebServer Execution - Linux

Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a web server without requiring additional software. This technique is commonly used in post-exploitation scenarios as it provides a simple method for transferring files between the compromised host and attacker-controlled systems.

LinuxProcess Creation
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Mohamed LAKRIFri Oct 17linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionmediumtest

Disk Image Creation Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to create a disk image.

macOSProcess Creation
TA0010 · Exfiltration
Omar KhaledSat Aug 10macos
Detectionlowtest

Split A File Into Pieces

Detection use of the command "split" to split files into parts and possible transfer.

macOSProcess Creation
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+2Thu Oct 15macos
Detectionlowtest

Cisco Stage Data

Various protocols maybe used to put data on the device for exfil or infil

Ciscoaaa
TA0009 · CollectionTA0008 · Lateral MovementTA0011 · Command and ControlTA0010 · Exfiltration+3
Austin ClarkMon Aug 12network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionmediumtest

Suspicious DNS Query with B64 Encoded String

Detects suspicious DNS queries using base64 encoding

dns
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionmediumtest

DNS TOR Proxies

Identifies IPs performing DNS lookups associated with common Tor proxies.

Zeek (Bro)dns
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Saw Winn Naung+1Sun Aug 15network
Detectionlowtest

WebDav Put Request

A General detection for WebDav user-agent being used to PUT files on a WebDav network share. This could be an indicator of exfiltration.

Zeek (Bro)http
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 Protocol
Roberto Rodriguez (Cyb3rWard0g)+1Sat May 02network
Detectionmediumtest

Rclone Activity via Proxy

Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string

Proxy Log
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Janantha MarasingheTue Oct 18web
Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Web Server Log
TA0003 · PersistenceTA0010 · ExfiltrationT1505.003 · Web Shell
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06web
Detectionmediumexperimental

MSSQL Destructive Query

Detects the invocation of MS SQL transactions that are destructive towards table or database data, such as "DROP TABLE" or "DROP DATABASE".

Windowsapplication
TA0010 · ExfiltrationTA0040 · ImpactT1485 · Data Destruction
Daniel DegasperiWed Jun 04windows
Detectionhightest

DNS Query for Anonfiles.com Domain - DNS Client

Detects DNS queries for anonfiles.com, which is an anonymous file upload platform often used for malicious purposes

Windowsdns-client
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

DNS Query To MEGA Hosting Website - DNS Client

Detects DNS queries for subdomains related to MEGA sharing website

Windowsdns-client
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionlowtest

DNS Query To Ufile.io - DNS Client

Detects DNS queries to "ufile.io", which was seen abused by malware and threat actors as a method for data exfiltration

Windowsdns-client
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionlowtest

Tap Driver Installation - Security

Detects the installation of a well-known TAP driver service. This could be a sign of potential preparation for data exfiltration using tunnelling techniques.

Windowssecurity
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Daniil Yugoslavskiy+2Thu Oct 24windows
Detectionmediumtest

Tap Driver Installation

Well-known TAP software installation. Possible preparation for data exfiltration using tunnelling techniques

Windowssystem
TA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Daniil Yugoslavskiy+2Thu Oct 24windows
Detectionhightest

DNS Query for Anonfiles.com Domain - Sysmon

Detects DNS queries for "anonfiles.com", which is an anonymous file upload platform often used for malicious purposes

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Martin MuellerFri Jul 15windows
Detectionmediumtest

DNS Query To AzureWebsites.NET By Non-Browser Process

Detects a DNS query by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

DNS Query To MEGA Hosting Website

Detects DNS queries for subdomains related to MEGA sharing website

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Aaron Greetham - NCC GroupWed May 26windows
Detectionlowtest

DNS Query To Ufile.io

Detects DNS queries to "ufile.io", which was seen abused by malware and threat actors as a method for data exfiltration

WindowsDNS Query
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
yatinwad+1Thu Jun 23windows
Detectionmediumtest

DNS Query To Visual Studio Code Tunnels Domain

Detects DNS query requests to Visual Studio Code tunnel domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web Protocols
citron_ninjaWed Oct 25windows
Detectionmediumtest

EVTX Created In Uncommon Location

Detects the creation of new files with the ".evtx" extension in non-common or non-standard location. This could indicate tampering with default EVTX locations in order to evade security controls or simply exfiltration of event log to search for sensitive information within. Note that backup software and legitimate administrator might perform similar actions during troubleshooting.

WindowsFile Event
TA0005 · Defense EvasionT1562.002 · Disable Windows Event Logging
D3F7A5105Mon Jan 02windows
Detectionhightest

NTDS Exfiltration Filename Patterns

Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.

WindowsFile Event
TA0006 · Credential AccessT1003.003 · NTDS
Florian Roth (Nextron Systems)Fri Mar 11windows
Detectionmediumtest

Rclone Config File Creation

Detects Rclone config files being created

WindowsFile Event
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Aaron Greetham - NCC GroupWed May 26windows
Detectionmediumtest

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Network Connection Initiated To BTunnels Domains

Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran SaifullahFri Sep 13windows