heroui logo

Audit Rules Deleted Via Auditctl

Sigma Rules

View Source
Summary
This rule aims to detect the execution of the command 'auditctl' with the '-D' parameter in Linux environments. The use of this command suggests an intention to delete all currently configured audit rules and any associated watchpoints. Such behavior can be indicative of malicious activity, as attackers frequently use this tactic to disable audit logging mechanisms in order to evade detection. Given that the removal of audit rules can severely limit the ability to monitor and track malicious activities, this rule serves as a critical safeguard for maintaining the integrity of logging and monitoring systems on Linux machines. It is important for security teams to investigate any instances of this command being executed, particularly any occurrences that appear out of the norm, as they may indicate a potential compromise. Additionally, system administrators may need to perform a thorough analysis of the context around legitimate uses of this command, such as administrative troubleshooting, to distinguish between benign and malicious activities.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
ATT&CK Techniques
  • T1562.012
Created: 2025-10-17