heroui logo

Linux Auditd Add User Account

Splunk Security Content

View Source
Summary
This detection rule monitors the creation of new user accounts on Linux systems through the execution of commands like 'useradd' or 'adduser'. It utilizes data sourced from Linux Audit daemon (auditd) logs, particularly focusing on process execution details captured via Endpoint Detection and Response (EDR) agents. Given that attackers often create new accounts to persist on compromised machines, this detection is crucial for identifying potentially malicious activities that could lead to privilege escalation and broader system compromises. The rule is structured to efficiently analyze Linux audit logs, specifically processing events related to SYSCALL and EXECVE to identify user account creation attempts. By filtering based on the command names, the detection aims to surface any unauthorized account creations that could indicate a security breach.
Categories
  • Linux
  • Endpoint
Data Sources
  • Kernel
  • Logon Session
  • Process
  • File
ATT&CK Techniques
  • T1136.001
  • T1136
Created: 2024-11-13