heroui logo

Linux Impair Defenses Process Kill

Splunk Security Content

View Source
Summary
The Linux Impair Defenses Process Kill detection rule identifies the use of the 'pkill' command, a common method employed by threat actors to terminate key processes on Linux systems, particularly those related to security defenses. It operates by utilizing telemetry data from Endpoint Detection and Response (EDR) agents, focusing on process names and their corresponding command-line executions. The significant threat posed by this command lies in its ability to disable security applications, thereby allowing adversaries to evade detection and undertake malicious operations, including potential data corruption or destruction. To effectively implement this detection rule, it requires data that includes process identifiers, names, and parental relationships to construct a comprehensive view of process activations and terminations, making it vital for incident response teams to closely monitor these events in their environments.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1562.001
  • T1562
Created: 2024-11-13