DETECTION OVERVIEW
Risk Factors
Attack tools can generate malware that automatically manages a SOCKS proxy connection, hiding a command-and-control (C&C) endpoint from network perimeter defenses. A SOCKS connection typically does not negatively affect network performance, but these connections should be examined before they facilitate critical and costly attacks.
The system might change the risk score for this detection.
Category

An attacker can hide C&C communications by installing malware on a compromised device that establishes a SOCKS connection to an external proxy server. The connection is established to the proxy through the firewall, and the proxy forwards traffic from the compromised device to the C&C server. SOCKS is a session layer (L5) protocol that connects on either TCP or UDP port 1080 by default. Unlike an HTTP proxy, which only forwards HTTP requests, a SOCKS proxy forwards all traffic.
Quarantine the device while checking for signs of compromise
Block all SOCKS traffic or TCP and UDP traffic to destination port 1080 at the network perimeter
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
