title: Detect the Use of Restic Backup too for Data Exfiltration
id: 12345678-1234-1234-1234-123456789012
description: |
Restic is an open-source backup tool that supports backing up data to various storage types, including local directories, SFTP servers, and cloud services like Amazon S3, Google Cloud Storage, and Microsoft Azure. Recently, it has been observed in use by the BlackCat Ransomware group.
status: experimental
references:
" rclone:"
condition: ((selection1 or selection2) or (selection3 and 1 of parameter*))
falsepositives:
Legitimate use of Restic for backup purposes
level: high
title: Detect Rundll32 and Schtasks Command Events Linked to CleanUpLoader
id: 12345678-1234-5678-1234-567812345678
status: experimental
description: Detects process creation events involving rundll32.exe and schtasks.exe commands associated with CleanUpLoader(Oyster Backdoor) activity on Windows systems.
references:
'Test'
condition: selection1 or (selection2 and selection21) or selection3 or selection4
falsepositives:
Scripts or automation tools that include similar command patterns
level: high
title: Detect DLL File Creation Events Linked to CleanUpLoader
id: 87654321-4321-8765-4321-876543218765
status: experimental
description: Detects the creation of specific DLL files in Temp or Downloads folders, potentially linked to CleanUpLoader(Oyster Backdoor) activity.
references:
title: Detect the Use of Restic Backup too for Data Exfiltration id: 12345678-1234-1234-1234-123456789012 description: | Restic is an open-source backup tool that supports backing up data to various storage types, including local directories, SFTP servers, and cloud services like Amazon S3, Google Cloud Storage, and Microsoft Azure. Recently, it has been observed in use by the BlackCat Ransomware group. status: experimental references:
title: Detect Rundll32 and Schtasks Command Events Linked to CleanUpLoader id: 12345678-1234-5678-1234-567812345678 status: experimental description: Detects process creation events involving rundll32.exe and schtasks.exe commands associated with CleanUpLoader(Oyster Backdoor) activity on Windows systems. references:
title: Detect DLL File Creation Events Linked to CleanUpLoader id: 87654321-4321-8765-4321-876543218765 status: experimental description: Detects the creation of specific DLL files in Temp or Downloads folders, potentially linked to CleanUpLoader(Oyster Backdoor) activity. references: