Fortinet white logo
Fortinet white logo

New detection rules and observations

New detection rules and observations

This page lists the new detections rules and observations in FortiNDR Cloud. New rules are created every month; however, it possible that a rule is created in a category that already exists.

2024.6.0

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack: Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Attack: Command and Control > Other Protocol

Application Layer Protocol

Attack: Command and Control > Other Protocol

Web Protocols

Attack: Command and Control > HTTP(S) Beaconing

Non-Application Layer Protocol

Attack: Command and Control > Custom Protocol

Ingress Tool Transfer

Attack: Installation > Remote File Copy from External

2024.5.0

Rules

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack: Command and Control > Other Protocol

Non-Application Layer Protocol

Attack:Command and Control > Other Protocol

2024.4.0

Rules

Primary ATT&CK Name

ATR Category

Network Denial of Service Attack: Impact > Network DoS
Exploit Public-Facing Application Attack: Exploitation > Exploit Public-facing Application
Network Denial of Service Attack: Impact > Network DoS
Network Denial of Service Posture: Anomalous Activity
Network Denial of Service Attack: Impact > Service DoS
Network Denial of Service Attack: Impact > Network DoS

2024.3.1

Rules

Primary ATT&CK Name

ATR Category

Application Layer Protocol PUA:Adware
Command and Scripting Interpreter Attack:Exploitation > Exploit Public-facing Application
Exfiltration Over Web Service Attack:Exfiltration > C2 Server Upload
Exploit Public-Facing Application Attack:Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Attack:Command and Control > Custom Protocol
Web Protocols Attack:Command and Control > HTTP(S) Beaconing

2024.3.0

Rules

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack:Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Posture:Potentially Unauthorized Software or Device

2024.2.0

Observations

Name

Description

SSL C2 Beaconing Similarity

Identify SSL connections that resemble Command and Control (C2) beaconing activity: telemetry that tells a C2 server the client is active and /or requests command(s) to execute. This observation performs statistical characterizations of the SSL connection to look for client software that calls back to a server on an extremely periodic schedule.

Rules

Primary ATT&CK Name

ATR Category

Web Protocols

Attack:Command and Control > Web Shell

Ingress Tool Transfer

Attack:Installation > Remote File Copy from External

Domain Groups

Attack:Discovery > Network Directory Scanning

LLMNR/NBT-NS Poisoning and SMB Relay

Attack:Infection Vector > LLMNR/NBT-NS Poisoning

Exploitation for Client Execution

Attack:Exploitation

Lateral Tool Transfer

Attack:Installation > Remote File Copy from External

Application Layer Protocol

PUA:Spyware

New detection rules and observations

New detection rules and observations

This page lists the new detections rules and observations in FortiNDR Cloud. New rules are created every month; however, it possible that a rule is created in a category that already exists.

2024.6.0

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack: Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Attack: Command and Control > Other Protocol

Application Layer Protocol

Attack: Command and Control > Other Protocol

Web Protocols

Attack: Command and Control > HTTP(S) Beaconing

Non-Application Layer Protocol

Attack: Command and Control > Custom Protocol

Ingress Tool Transfer

Attack: Installation > Remote File Copy from External

2024.5.0

Rules

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack: Command and Control > Other Protocol

Non-Application Layer Protocol

Attack:Command and Control > Other Protocol

2024.4.0

Rules

Primary ATT&CK Name

ATR Category

Network Denial of Service Attack: Impact > Network DoS
Exploit Public-Facing Application Attack: Exploitation > Exploit Public-facing Application
Network Denial of Service Attack: Impact > Network DoS
Network Denial of Service Posture: Anomalous Activity
Network Denial of Service Attack: Impact > Service DoS
Network Denial of Service Attack: Impact > Network DoS

2024.3.1

Rules

Primary ATT&CK Name

ATR Category

Application Layer Protocol PUA:Adware
Command and Scripting Interpreter Attack:Exploitation > Exploit Public-facing Application
Exfiltration Over Web Service Attack:Exfiltration > C2 Server Upload
Exploit Public-Facing Application Attack:Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Attack:Command and Control > Custom Protocol
Web Protocols Attack:Command and Control > HTTP(S) Beaconing

2024.3.0

Rules

Primary ATT&CK Name

ATR Category

Exploit Public-Facing Application Attack:Exploitation > Exploit Public-facing Application
Non-Application Layer Protocol Posture:Potentially Unauthorized Software or Device

2024.2.0

Observations

Name

Description

SSL C2 Beaconing Similarity

Identify SSL connections that resemble Command and Control (C2) beaconing activity: telemetry that tells a C2 server the client is active and /or requests command(s) to execute. This observation performs statistical characterizations of the SSL connection to look for client software that calls back to a server on an extremely periodic schedule.

Rules

Primary ATT&CK Name

ATR Category

Web Protocols

Attack:Command and Control > Web Shell

Ingress Tool Transfer

Attack:Installation > Remote File Copy from External

Domain Groups

Attack:Discovery > Network Directory Scanning

LLMNR/NBT-NS Poisoning and SMB Relay

Attack:Infection Vector > LLMNR/NBT-NS Poisoning

Exploitation for Client Execution

Attack:Exploitation

Lateral Tool Transfer

Attack:Installation > Remote File Copy from External

Application Layer Protocol

PUA:Spyware