<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sandworm Tools — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/actors/sandworm-tools/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/actors/sandworm-tools/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Iptables Firewall Modification Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-linux-iptables-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linux-iptables-modification/</guid><description>This brief details a Splunk search that identifies suspicious command-line activity modifying iptables firewall settings on Linux systems, potentially indicating Cyclops Blink malware activity allowing C2 communication by opening specific TCP ports.</description><content:encoded><![CDATA[<p>This detection focuses on identifying malicious modifications to iptables firewall settings on Linux systems. The activity is associated with malware such as Cyclops Blink, known to alter firewall rules to facilitate Command and Control (C2) communication. The Splunk search analyzes process command lines, looking for iptables commands that open specific TCP ports (3269, 636, 989, 994, 995, 8443). The detection logic filters out common legitimate parent process paths to reduce false positives. Successful exploitation can lead to persistent access and data exfiltration. The original Splunk search was published on 2026-05-05.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Linux system, possibly through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker or malware executes a command to modify the iptables firewall settings.</li>
<li>The iptables command uses the <code>--dport</code> flag to specify a TCP port to open (e.g., 3269, 636, 989, 994, 995, 8443).</li>
<li>The command includes the <code>ACCEPT</code> action, allowing traffic to the specified port.</li>
<li>The command redirects output to <code>/dev/null</code> to hide the activity.</li>
<li>The modified iptables rules allow inbound traffic on the opened port(s).</li>
<li>The attacker uses the opened port(s) for C2 communication with the compromised system.</li>
<li>The attacker maintains persistent access and potentially exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of iptables can expose internal services to external attackers, facilitating unauthorized access, data exfiltration, and further compromise of the affected system. Cyclops Blink malware targets ASUS routers, allowing attackers to gain control over network devices and potentially pivot to other systems on the network. The number of affected devices can range from a few to thousands depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Linux Iptables Firewall Modification</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts triggered by the <code>Linux Iptables Firewall Modification</code> rule, focusing on unusual parent processes and destination systems.</li>
<li>Review the references provided, specifically the NCSC report and Trend Micro analysis on Cyclops Blink, for additional context and IOCs.</li>
<li>Monitor systems for network connections to the opened ports (3269, 636, 989, 994, 995, 8443) as identified in the rule logic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>iptables</category><category>firewall</category><category>linux</category><category>cyclopsblink</category></item></channel></rss>