
Summary
This detection rule is designed to identify potentially malicious activities where a user or an automated script is stopping or disabling services on a Linux system. It monitors process creation events in the Linux environment, focusing on specific utilities like 'systemctl', 'service', and 'chkconfig', which are commonly used to manage system services. The rule particularly looks for command lines that include keywords such as 'stop' or 'disable', indicating an intention to halt operations of critical services or tools. The detection mechanism leverages the capabilities of Sigma rules to analyze process execution logs for these indicators, enabling administrators to respond quickly to potential threat scenarios. Potential false positives may arise from legitimate administrative activities where services are intentionally stopped or disabled as part of regular system maintenance. The rule emphasizes the need for careful investigation of alerts to distinguish between harmful and benign actions, as authorized personnel may perform similar commands as a routine task.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2022-09-15