DETECTION OVERVIEW
Risk Factors
Attack tools can generate malware that automatically manages a SOCKS proxy connection, hiding a command-and-control (C&C) endpoint from network perimeter defenses. A SOCKS connection typically does not negatively affect network performance, but these connections should be examined before they facilitate critical and costly attacks.
The system might change the risk score for this detection.
Kill Chain
Risk Score
33
An attacker can hide C&C communications by installing malware on a compromised device that establishes a SOCKS connection to an external proxy server. The connection is established to the proxy through the firewall, and the proxy forwards traffic from the compromised device to the C&C server. SOCKS is a session layer (L5) protocol that connects on either TCP or UDP port 1080 by default. Unlike an HTTP proxy, which only forwards HTTP requests, a SOCKS proxy forwards all traffic.
Quarantine the device while checking for signs of compromise
Block all SOCKS traffic or TCP and UDP traffic to destination port 1080 at the network perimeter