
Summary
This Elastic detection rule identifies potential misuse of the `unshare` command in Linux environments, which can be exploited to manipulate system namespaces—opening avenues for privilege escalation or breaking out of container security boundaries. The `unshare` command allows for creating new namespaces that can separate processes from the host environment, which can be used maliciously to access restricted resources or elevate privileges. This rule filters out benign executions of `unshare`, specifically monitoring for its usage in contexts unlikely to be associated with legitimate system processes. The detection query specifics include a set condition where the process's parent executable is neither `udevadm`, `systemd-udevd`, nor involves specific commands such as `/usr/bin/snap` or Java processes, all aimed at reducing false positives similar to legitimate service actions. Notably, the risk score assigned to this rule is 47, indicating a medium severity level, highlighting a need for prompt investigation upon triggering. The setup requires integrating with either Elastic Defend or Auditbeat, ensuring proper event monitoring on Linux systems to mitigate security risks associated with unintended `unshare` usage.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- Application Log
- Network Traffic
ATT&CK Techniques
- T1543
Created: 2022-08-30