<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Palo Alto Network Traffic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/palo-alto-network-traffic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/palo-alto-network-traffic/feed.xml" rel="self" type="application/rss+xml"/><item><title>Large ICMP Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</guid><description>This analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.</description><content:encoded><![CDATA[<p>This detection focuses on identifying anomalous ICMP (Internet Control Message Protocol) traffic indicative of malicious activity. ICMP is typically used for network diagnostics but can be abused for covert communication, data exfiltration, or command-and-control (C2) by threat actors. This analytic identifies ICMP traffic exceeding 1,000 bytes directed toward external IP addresses, filtering out internal networks. The detection logic leverages the Network_Traffic data model. Validated malicious instances may signal ICMP tunneling, unauthorized data transfer, or compromised endpoints. The data sources for this analytic include Palo Alto Network Traffic and Cisco Secure Access Firewall logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a host within the network.</li>
<li>The compromised host initiates ICMP traffic to an external IP address.</li>
<li>The ICMP traffic exceeds 1000 bytes, evading default network monitoring thresholds.</li>
<li>The attacker uses ICMP to tunnel data, bypassing normal data transfer protocols.</li>
<li>The compromised host uses ICMP for command and control, receiving instructions from the external attacker.</li>
<li>The attacker establishes a covert communication channel using ICMP, masking their activity within normal network traffic.</li>
<li>Sensitive data is exfiltrated via ICMP packets to the attacker-controlled external server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation through large ICMP traffic can lead to data breaches, unauthorized access to internal resources, and the establishment of persistent command and control within the network. ICMP tunneling can bypass traditional security measures, allowing attackers to operate undetected. The impact of successful exploitation includes the potential compromise of sensitive data, disruption of network services, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Large ICMP Traffic</code> to your SIEM and tune the byte threshold (currently 1000 bytes) based on your network baseline to minimize false positives.</li>
<li>Investigate any alerts generated by the <code>Detect Large ICMP Traffic</code> rule, focusing on the source and destination IPs involved.</li>
<li>Examine network traffic logs for patterns indicative of ICMP tunneling or covert communication channels, using the provided data sources.</li>
<li>Utilize the provided search <code>View the detection results</code> to review related events and potential lateral movement.</li>
<li>Implement the provided search <code>View risk events</code> to look at risk factors for the involved assets.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>network-traffic</category><category>command-and-control</category><category>data-exfiltration</category></item></channel></rss>