PUA - Restic Backup Tool Execution

Detects the execution of the Restic backup tool, which can be used for data exfiltration. Threat actors may leverage Restic to back up and exfiltrate sensitive data to remote storage locations, including cloud services. If not legitimately used in the enterprise environment, its presence may indicate malicious activity.

Sigma rule (View on GitHub)

 1title: PUA - Restic Backup Tool Execution
 2id: 6ddff2e8-ea1a-45d0-8938-93dfc1d67ae7
 3status: experimental
 4description: |
 5    Detects the execution of the Restic backup tool, which can be used for data exfiltration.
 6    Threat actors may leverage Restic to back up and exfiltrate sensitive data to remote storage locations, including cloud services.
 7    If not legitimately used in the enterprise environment, its presence may indicate malicious activity.    
 8references:
 9    - https://thedfirreport.com/2024/09/30/nitrogen-campaign-drops-sliver-and-ends-with-blackcat-ransomware/#exfiltration
10    - https://restic.net/
11    - https://restic.readthedocs.io/en/stable/030_preparing_a_new_repo.html
12author: Nounou Mbeiri, Swachchhanda Shrawan Poudel (Nextron Systems)
13date: 2025-10-17
14tags:
15    - attack.exfiltration
16    - attack.t1048
17    - attack.t1567.002
18logsource:
19    product: windows
20    category: process_creation
21detection:
22    selection_specific:
23        - CommandLine|contains|all:
24              - '--password-file'
25              - 'init'
26              - ' -r '
27        - CommandLine|contains|all:
28              - '--use-fs-snapshot'
29              - 'backup'
30              - ' -r '
31    selection_restic:
32        CommandLine|contains:
33            - 'sftp:'
34            - 'rest:http'
35            - 's3:s3.'
36            - 's3.http'
37            - 'azure:'
38            - ' gs:'
39            - 'rclone:'
40            - 'swift:'
41            - ' b2:'
42        CommandLine|contains|all:
43            - ' init '
44            - ' -r '
45    condition: 1 of selection_*
46falsepositives:
47    - Legitimate use of Restic for backup purposes within the organization.
48level: high

References

Related rules

to-top