heroui logo

High-Frequency nft Executions by Unprivileged User

Anvilogic Forge

View Source
Summary
The detection rule identifies suspicious behavior linked to a potential exploitation attempt of the CVE-2024-1086 vulnerability in the Linux kernel, related to the nftables utility. Specifically, it targets high-frequency executions of the 'nft' command by unprivileged users, which is atypical behavior in production environments. In scenarios where an unprivileged user invokes 'nft' more than five times within a ten-second interval, this could signify attempts to escalate privileges illicitly. The rule captures data from Linux audit logs and utilizes Splunk logic to flag such behaviors, aiding in the early detection of possible security incidents before they escalate to full compromise.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1068
Created: 2025-04-04