Netcat makes or gets connections

Cortex XDR Analytics Alert Reference by data source

Last date published
2024-04-15
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

ATT&CK Tactic

Command and Control (TA0011)

ATT&CK Technique

Proxy: Multi-hop Proxy (T1090.003)

Severity

High

Description

Malicious actors can use Netcat for privilege escalation, remote code execution, data exfiltration and protocol tunneling to evade detection.

Attacker's Goals

  • Establish command and control channel.
  • Propagate in the victim network.

Investigative actions

Verify that the usage of Netcat/Netcat64 is from an authorized personnel and that user has the right to access the remote host.