Hello,
This rule is enabled both on the inside network as the border side (internet):
alert udp $HOME_NET any → any any (msg:“ET EXPLOIT Possible Apache log4j RCE Attempt - 2021/12/12 Obfuscation Observed M2 (udp) (Outbound) (CVE-2021-44228)”; content:“|24 7b|”; content:“|24 7b 3a 3a|”; within:100; fast_pattern; reference:cve,2021-44228; classtype:attempted-admin; sid:2034805; rev:3; metadata:attack_target Server, created_at 2021_12_18, cve CVE_2021_44228, deployment Perimeter, deployment Internal, former_category EXPLOIT, confidence Low, signature_severity Major, tag Exploit, updated_at 2023_06_05;)
Yesterday there where 2 hits: one on the inside ip and one on the nat ip adress causing million of packets to be logged so taking a big amount of file storage (the complete stream for both?)
suricata.yaml:
- pcap-log:
enabled: yes
filename: log.pcap
limit: 1000mb
max-files: 2000
compression: lz4
#lz4-checksum: no
lz4-level: 4
mode: normal
use-stream-depth: yes
honor-pass-rules: yes
conditional: alerts
Is this expected behaviour according to our config, or something I need to correct in the suricata config?
Cheers,
Andre