Skip to content

Commit 8cff5c0

Browse files
committed
update descriptions
1 parent 572a935 commit 8cff5c0

6 files changed

+18
-16
lines changed

detections/endpoint/linux_auditd_possible_access_or_modification_of_sshd_config_file.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,10 @@ author: Teoderick Contreras, Nasreddine Bencherchali, Splunk
66
status: production
77
type: Anomaly
88
description: |
9-
The following analytic detects suspicious access or modification of the sshd_config file on Linux systems.
10-
It leverages data from Linux Auditd, focusing on command-line executions involving processes like "cat", "nano", "vim", and "vi" accessing the sshd_config file.
11-
This activity is significant because unauthorized changes to sshd_config can allow threat actors to redirect port connections or use unauthorized keys, potentially compromising the system.
9+
The following analytic detects access, deletion or modification of the ssh_config file on Linux systems.
10+
It leverages data from Linux Auditd, focusing on events of type PATH with a nametype of ("NORMAL", "CREATE", "DELETE").
11+
This activity could be significant because unauthorized changes to ssh_config can allow threat actors to redirect port connections or use unauthorized keys, potentially compromising the system.
12+
Correlate this with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1213
If confirmed malicious, this could lead to unauthorized access, privilege escalation, or persistent backdoor access, posing a severe security risk.
1314
data_source:
1415
- Linux Auditd Path

detections/endpoint/linux_auditd_possible_access_to_sudoers_file.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@ status: production
77
type: Anomaly
88
description: |
99
The following analytic detects potential access or modification of the /etc/sudoers file on a Linux system.
10-
It leverages data from Linux Auditd, focusing on processes like "cat," "nano," "vim," and "vi" accessing the /etc/sudoers file.
11-
This activity is significant because the sudoers file controls user permissions for executing commands with elevated privileges.
10+
It leverages data from Linux Auditd, focusing on events of type PATH or CWD.
11+
This activity could be significant because the sudoers file controls user permissions for executing commands with elevated privileges.
12+
Correlate this with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1213
If confirmed malicious, an attacker could gain persistence or escalate privileges, compromising the security of the targeted host.
1314
data_source:
1415
- Linux Auditd Path

detections/endpoint/linux_auditd_possible_append_cronjob_entry_on_existing_cronjob_file.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,10 @@ author: Teoderick Contreras, Splunk
66
status: production
77
type: Hunting
88
description: |
9-
The following analytic detects potential tampering with cronjob files on a Linux system by identifying 'echo' commands that append code to existing cronjob files.
10-
It leverages logs from Linux Auditd, focusing on process names, parent processes, and command-line executions.
11-
This activity is significant because adversaries often use it for persistence or privilege escalation.
9+
The following analytic detects potential tampering with cronjob files on a Linux system.
10+
It leverages logs from Linux Auditd, focusing on events of type PATH or CWD.
11+
This activity could be significant because adversaries often use it for persistence or privilege escalation.
12+
Correlate this with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1213
If confirmed malicious, this could allow attackers to execute unauthorized code automatically, leading to system compromises and unauthorized data access, thereby impacting business operations and data integrity.
1314
data_source:
1415
- Linux Auditd Path

detections/endpoint/linux_auditd_preload_hijack_via_preload_file.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ description: |
99
The following analytic detects suspicious preload hijacking via the `preload` file, which may indicate an attacker's attempt to intercept or manipulate library loading processes.
1010
The `preload` file can be used to force the loading of specific libraries before others, potentially allowing malicious code to execute or alter application behavior.
1111
By monitoring for unusual or unauthorized modifications to the `preload` file, this analytic helps identify attempts to hijack preload mechanisms, enabling security teams to investigate and address potential threats to system integrity and security.
12+
Correlate this with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1213
data_source:
1314
- Linux Auditd Path
1415
- Linux Auditd Cwd

detections/endpoint/linux_auditd_unix_shell_configuration_modification.yml

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,11 @@ author: Teoderick Contreras, Splunk
66
status: production
77
type: TTP
88
description: |
9-
The following analytic detects suspicious modifications to Unix shell
10-
configuration files, which may indicate an attempt to alter system behavior or gain
11-
unauthorized access. Unix shell configuration files, such as `.bashrc` or `.profile`,
12-
control user environment settings and command execution. Unauthorized changes to
13-
these files can be used to execute malicious commands, escalate privileges, or hide
14-
malicious activities. By monitoring for unusual or unauthorized modifications to
15-
shell configuration files, this analytic helps identify potential security threats,
16-
allowing security teams to respond quickly and mitigate risks.
9+
The following analytic detects suspicious access or modifications to Unix shell configuration files, which may indicate an attempt to alter system behavior or gain unauthorized access.
10+
Unix shell configuration files, such as `.bashrc` or `.profile`, control user environment settings and command execution.
11+
Unauthorized changes to these files can be used to execute malicious commands, escalate privileges, or hide malicious activities.
12+
By monitoring for unusual or unauthorized modifications to shell configuration files, this analytic helps identify potential security threats, allowing security teams to respond quickly and mitigate risks.
13+
Correlate this with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1714
data_source:
1815
- Linux Auditd Path
1916
- Linux Auditd Cwd

detections/endpoint/linux_magic_sysrq_key_abuse.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ description: |
99
Detects potential abuse of the Linux Magic SysRq (System Request) key by adversaries with root or sufficient privileges to manipulate or destabilize a system.
1010
Writing to /proc/sysrq-trigger can crash the system, kill processes, or bypass standard logging.
1111
Monitoring SysRq abuse helps detect stealthy post-exploitation activity.
12+
Correlate with related EXECVE or PROCTITLE events to identify the process or user responsible for the access or modification.
1213
data_source:
1314
- Linux Auditd Path
1415
- Linux Auditd Cwd

0 commit comments

Comments
 (0)