
Summary
The 'Unusual Linux Username' detection rule utilizes machine learning to identify anomalies associated with username activity that deviates from normal patterns within a Linux environment. When user accounts that are not typically active exhibit login attempts or actions, they may indicate unauthorized access, lateral movement, or compromised credentials. This rule is predicated on the understanding that new user accounts generally become active only as part of expected organizational workflows, such as onboarding new employees. Events triggered by rarely utilized usernames could hint at potential security risks, including lateral movement involving compromised credentials. The rule is set to analyze events over the past 45 minutes, running in 15-minute intervals, and is integrated with Elastic's machine learning capabilities for enhanced threat detection. It is crucial to ensure that the corresponding machine learning job is operational for the detection to function as intended. Organizations are cautioned to investigate unusual activities flagged by this rule carefully, considering legitimate troubleshooting activities versus potential threats.
Categories
- Endpoint
- Linux
- Cloud
Data Sources
- User Account
- Network Traffic
- Application Log
ATT&CK Techniques
- T1078
Created: 2020-03-25