You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A suspicious process engaging in a DNS query has been identified through the analysis of known-abuse web services. This analytical approach detects questionable activities involving text-paste web services, VoIP, instant messaging, and digital distribution platforms, commonly exploited by adversaries, malware actors, and red teams. This technique is often utilized to either download malicious files or function as a Command and Control (C2) server.
Description of the Idea of the Rule
A suspicious process engaging in a DNS query has been identified through the analysis of known-abuse web services. This analytical approach detects questionable activities involving text-paste web services, VoIP, instant messaging, and digital distribution platforms, commonly exploited by adversaries, malware actors, and red teams. This technique is often utilized to either download malicious files or function as a Command and Control (C2) server.
Public References / Example Event Log
The text was updated successfully, but these errors were encountered: