
Summary
This detection rule is designed to identify potential privilege escalation attempts via modifications to the sudoers file in Unix-like systems, such as Linux and macOS. The sudoers file is critical for managing user permissions for executing commands with elevated privileges. Attackers may attempt to modify this file to exploit the NOPASSWD directive, which allows specified users to execute commands without being prompted for a password. The rule captures suspicious activities involving process arguments that indicate attempts to alter sudoers configurations, specifically when a process executes commands containing the pattern 'echo' followed by 'NOPASSWD ALL'. The rule aims to alert administrators of potentially unauthorized changes and understand the context in which these command attempts occur. It provides guidelines for investigation, false positive analysis, and response tactics to mitigate the identified threats effectively.
Categories
- Endpoint
- Linux
- macOS
Data Sources
- Logon Session
- Process
- Application Log
ATT&CK Techniques
- T1548
- T1548.003
Created: 2021-01-26