heroui logo

Pluggable Authentication Module (PAM) Source Download

Elastic Detection Rules

View Source
Summary
The detection rule identifies attempts to download the source code of Pluggable Authentication Module (PAM) shared object files using `curl` or `wget` on Linux systems. Such actions may indicate malicious intent, as attackers commonly download PAM source code to create backdoors, compromising user authentication processes. This rule utilizes Elastic Query Language (EQL) to monitor for specific patterns in process execution on endpoints, focusing on Linux operating systems. The detection logic looks for events where a process named either `curl` or `wget` is executed with arguments matching a particular URL format tied to PAM releases. Possible false positives may occur from legitimate updates or configuration changes, thus requiring additional scrutiny of user accounts and command histories. The rule emphasizes the importance of protecting PAM configurations and monitoring atypical download behavior.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1543
  • T1556
Created: 2024-12-16