DETECTION OVERVIEW
Risk Factors
The Merlin framework is publicly available and has been associated with known attack campaigns. Command-and-control (C&C) connections generated by a Merlin agent indicate that an attacker could remotely control a device and gain an entry point for further attacks on the network.
Kill Chain
Risk Score
88
Merlin is a post-exploit framework. An attacker installs a Merlin agent on the victim device. The agent establishes a connection with an attacker-controlled server and sends a specially designed HTTP POST request. These types of requests can contain command output and other information that is valuable to the attackers.
Quarantine the device while checking for the presence of malware
Monitor and investigate unusual network activity for lateral movement or data exfiltration