Data Exfiltration with Wget

Detects attempts to post the file with the usage of wget utility. The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.

Sigma rule (View on GitHub)

 1title: Data Exfiltration with Wget
 2id: cb39d16b-b3b6-4a7a-8222-1cf24b686ffc
 3status: test
 4description: |
 5    Detects attempts to post the file with the usage of wget utility.
 6    The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.    
 7references:
 8    - https://linux.die.net/man/1/wget
 9    - https://gtfobins.github.io/gtfobins/wget/
10author: 'Pawel Mazur'
11date: 2021/11/18
12modified: 2022/12/25
13tags:
14    - attack.exfiltration
15    - attack.t1048.003
16logsource:
17    product: linux
18    service: auditd
19detection:
20    selection:
21        type: EXECVE
22        a0: wget
23        a1|startswith: '--post-file='
24    condition: selection
25falsepositives:
26    - Legitimate usage of wget utility to post a file
27level: medium

References

Related rules

to-top