Suspicious manipulation of firewall detected via Syslog data

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query searches for any suspicious manipulation of firewall often performed by attackers after exploiting remote code execution vulnerability in Log4j component of Apache for C2 communications or exfiltration.

Attribute Value
Type Hunting Query
Solution Apache Log4j Vulnerability Detection
ID e178baf5-3cf3-4960-8ca4-8da6d90d8206
Tactics DefenseEvasion
Techniques T1562
Required Connectors Syslog
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
Syslog Facility == "user"
SyslogMessage has "AUOMS_EXECVE"
?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Apache Log4j Vulnerability Detection