
Summary
This detection rule focuses on identifying potential Linux persistence and privilege escalation behaviors that may indicate a security risk within the environment. The rule utilizes risk scoring and event counting from various Linux data sources to highlight tactics often employed by attackers to maintain access and elevate privileges. By monitoring these behaviors, security teams can detect anomalies that suggest malicious activities, such as unauthorized code execution at elevated privilege levels, which could lead to data breaches or other severe security incidents. The rule integrates both Tactics and Techniques based on the MITRE ATT&CK framework, specifically targeting the persistence and privilege escalation techniques commonly leveraged by adversaries.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
- Application Log
- Kernel
- Network Traffic
ATT&CK Techniques
- T1548
Created: 2024-11-13