<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cyclopsblink — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cyclopsblink/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cyclopsblink/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Iptables Firewall Modification Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-linux-iptables-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linux-iptables-modification/</guid><description>This brief details a Splunk search that identifies suspicious command-line activity modifying iptables firewall settings on Linux systems, potentially indicating Cyclops Blink malware activity allowing C2 communication by opening specific TCP ports.</description><content:encoded><![CDATA[<p>This detection focuses on identifying malicious modifications to iptables firewall settings on Linux systems. The activity is associated with malware such as Cyclops Blink, known to alter firewall rules to facilitate Command and Control (C2) communication. The Splunk search analyzes process command lines, looking for iptables commands that open specific TCP ports (3269, 636, 989, 994, 995, 8443). The detection logic filters out common legitimate parent process paths to reduce false positives. Successful exploitation can lead to persistent access and data exfiltration. The original Splunk search was published on 2026-05-05.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Linux system, possibly through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker or malware executes a command to modify the iptables firewall settings.</li>
<li>The iptables command uses the <code>--dport</code> flag to specify a TCP port to open (e.g., 3269, 636, 989, 994, 995, 8443).</li>
<li>The command includes the <code>ACCEPT</code> action, allowing traffic to the specified port.</li>
<li>The command redirects output to <code>/dev/null</code> to hide the activity.</li>
<li>The modified iptables rules allow inbound traffic on the opened port(s).</li>
<li>The attacker uses the opened port(s) for C2 communication with the compromised system.</li>
<li>The attacker maintains persistent access and potentially exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of iptables can expose internal services to external attackers, facilitating unauthorized access, data exfiltration, and further compromise of the affected system. Cyclops Blink malware targets ASUS routers, allowing attackers to gain control over network devices and potentially pivot to other systems on the network. The number of affected devices can range from a few to thousands depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Linux Iptables Firewall Modification</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts triggered by the <code>Linux Iptables Firewall Modification</code> rule, focusing on unusual parent processes and destination systems.</li>
<li>Review the references provided, specifically the NCSC report and Trend Micro analysis on Cyclops Blink, for additional context and IOCs.</li>
<li>Monitor systems for network connections to the opened ports (3269, 636, 989, 994, 995, 8443) as identified in the rule logic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>iptables</category><category>firewall</category><category>linux</category><category>cyclopsblink</category></item><item><title>Linux Stdout Redirection to /dev/null Indicates Potential Malware Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-linux-stdout-redirection-dev-null/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-linux-stdout-redirection-dev-null/</guid><description>The redirection of standard output to /dev/null on Linux systems, particularly when observed in conjunction with other suspicious activities, can indicate attempts to hide malicious command execution, as seen in malware like Cyclops Blink, potentially leading to unauthorized system modifications and persistent access.</description><content:encoded><![CDATA[<p>This brief addresses the detection of command-line activity that redirects standard output (stdout) or standard error (stderr) to the <code>/dev/null</code> file on Linux systems. This behavior is often used to suppress output from commands, which can be a legitimate administrative practice. However, when used maliciously, it can conceal the actions of malware or attackers. The analysis is based on process execution logs typically collected by Endpoint Detection and Response (EDR) agents. The Cyclops Blink malware has been observed using this technique to hide modifications to <code>iptables</code> firewall settings. This activity can allow an attacker to stealthily alter system configurations, potentially leading to unauthorized access or persistent control over the compromised machine. The detection focuses on identifying command lines containing patterns like <code>*&amp;&gt;/dev/null*</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Linux system (potentially via an exploit or compromised credentials).</li>
<li>The attacker executes a malicious script or binary on the system.</li>
<li>The script or binary contains commands to modify system configurations (e.g., <code>iptables</code> rules).</li>
<li>The output of these commands is redirected to <code>/dev/null</code> using <code>&amp;&gt;/dev/null</code> to hide the changes from standard logging and user observation.</li>
<li>The modified system configurations allow the attacker to establish persistence or gain unauthorized access.</li>
<li>The attacker may further deploy additional malicious tools or scripts while continuing to redirect output to <code>/dev/null</code> to evade detection.</li>
<li>The attacker maintains covert access to the system, using the modified configurations for ongoing malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to the compromised Linux system, allowing attackers to perform a variety of malicious activities undetected. This includes installing backdoors, exfiltrating sensitive data, or disrupting services. In the case of Cyclops Blink, the malware modifies firewall rules, which can open up the system to further attacks. The number of affected systems and the severity of the impact will vary depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Linux Stdout Redirection To Dev Null File</code> to your SIEM and tune it to your environment to detect suspicious command-line activity.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not normally associated with <code>/dev/null</code> redirection.</li>
<li>Enable Sysmon for Linux Event ID 1 to ensure the necessary process execution logs are available (see <code>data_source</code> in the rule).</li>
<li>Review the references to understand the Cyclops Blink malware and its use of this technique.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>linux</category><category>malware</category><category>cyclopsblink</category><category>anomaly</category><category>endpoint</category></item></channel></rss>