← Back to SOC feed Coverage →

Potential Hello-World Scraper Botnet Activity

sigma MEDIUM SigmaHQ
T1595
imWebSession
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: low

Hunt Hypothesis

The hypothesis is that the detected network traffic represents a scraper botnet attempting to exfiltrate data by establishing persistent, low-and-slow connections to command-and-control servers. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential data exfiltration and botnet command-and-control activities early.

Detection Rule

Sigma (Original)

title: Potential Hello-World Scraper Botnet Activity
id: 1712bafe-be05-4a0e-89d4-17a3ed151bf5
status: experimental
description: |
    Detects network traffic potentially associated with a scraper botnet variant that uses the "Hello-World/1.0" user-agent string.
references:
    - https://www.greynoise.io/blog/new-scraper-botnet-concentrated-in-taiwan
    - https://viz.greynoise.io/tags/hello-world-scraper-botnet?days=30
author: Joseph A. M.
date: 2025-08-02
tags:
    - attack.reconnaissance
    - attack.t1595
logsource:
    category: proxy
detection:
    selection:
        c-useragent: 'Hello-World/1.0'
        cs-method: 'GET'
    condition: selection
falsepositives:
    - Legitimate network monitoring or vulnerability scanning tools that may use this generic user agent.
    - Internal development or testing scripts. Consider filtering by source IP if this is expected from certain systems.
level: medium

KQL (Azure Sentinel)

imWebSession
| where HttpUserAgent =~ "Hello-World/1.0" and HttpRequestMethod =~ "GET"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/web/proxy_generic/proxy_hello_world_user_agent.yml