Detection rules › Sigma

Communication To LocaltoNet Tunneling Service Initiated

Severity
high
Author
Andreas Braathen (mnemonic.io)
Source
upstream

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1090 Proxy, T1102 Web Service, T1572 Protocol Tunneling

Event coverage

ProviderEvent IDTitle
Sysmon3Network connection

Stages and Predicates

Stage 1: selection

or:
DestinationHostname|endswith: .localto.net
DestinationHostname|endswith: .localtonet.com
Initiated: true

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
DestinationHostnameends_with
  • .localto.net
  • .localtonet.com
Initiatedeq
  • true corpus 40 (sigma 40)