<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-Tunnel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network-tunnel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network-tunnel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Cloudflared Network Tunnel Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-cloudflared-tunnel/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cloudflared-tunnel/</guid><description>This brief detects network connection events associated with the Cloudflared tool, used to create tunnels via Cloudflare, potentially for unauthorized access or exfiltration, by establishing outbound connections to Cloudflare Edge Servers.</description><content:encoded><![CDATA[<p>Cloudflared is a tool that creates secure tunnels through Cloudflare&rsquo;s network, similar in function to ngrok. Attackers can abuse Cloudflared to establish stealthy connections to compromised systems, bypassing traditional network security controls. The tool creates an outbound connection over HTTPS (HTTP2/QUIC) to Cloudflare Edge Servers. The tunnel controller then makes services or private networks accessible, potentially enabling data exfiltration or remote access without direct exposure of the target system. This technique has been observed in the wild, where threat actors leverage Cloudflare tunnels to mask their activities. Detecting Cloudflared connections can be challenging due to the legitimate use of the tool, but monitoring network connections for specific patterns can help identify potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a target system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker downloads and installs the Cloudflared tool on the compromised system.</li>
<li>The attacker configures Cloudflared to create a tunnel to a Cloudflare Edge Server, specifying a local service or port to forward.</li>
<li>Cloudflared establishes an outbound connection to Cloudflare over HTTPS (HTTP2/QUIC) on port 7844.</li>
<li>The attacker uses the Cloudflare tunnel to access internal resources or exfiltrate data from the compromised system, bypassing traditional network security controls.</li>
<li>The attacker maintains persistent access through the Cloudflare tunnel, enabling ongoing command and control.</li>
<li>The attacker may use the tunnel to proxy connections to other internal systems, further expanding their reach within the network.</li>
<li>The attacker achieves their objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to internal resources, data exfiltration, and potential compromise of sensitive information. The use of Cloudflare tunnels makes it difficult to trace the attacker&rsquo;s origin, hindering incident response efforts. Abuse of Cloudflared may lead to full system compromise, intellectual property theft, and reputational damage. While no specific victim counts or sector targeting is identified in this source, the increasing abuse of Cloudflare tunnels by hackers is noted by BleepingComputer.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Potential Cloudflared Network Tunnel&rdquo; Sigma rule to your SIEM and tune it for your environment, focusing on <code>Network_Traffic.All_Traffic</code> data model, dest_port 7844, and associated network connection details.</li>
<li>Implement Sysmon Event ID 3 (Network Connect) logging to provide the data necessary for the provided Sigma rule.</li>
<li>Filter alerts generated by the Sigma rule based on known and approved Cloudflared deployments within the organization to reduce false positives, as noted in the &ldquo;known_false_positives&rdquo; section.</li>
<li>Review network connection logs for outbound connections to Cloudflare Edge Servers on destination port 7844, as highlighted in the attack chain, to identify potential unauthorized Cloudflared usage.</li>
<li>Investigate endpoints exhibiting suspicious network connection behavior involving Cloudflared, focusing on process ancestry and command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloudflared</category><category>reverse-proxy</category><category>tunneling</category><category>network-tunnel</category></item></channel></rss>