heroui logo

DD File Overwrite

Sigma Rules

View Source
Summary
The 'DD File Overwrite' detection rule identifies potential threats associated with file overwriting and deletion operations executed via the 'dd' command in Linux environments. The rule specifically focuses on monitoring process creations where the 'dd' image is invoked. To ascertain whether such an operation is legitimate or indicative of malicious behavior, the rule looks for specific command line patterns that include output file redirection (indicated by 'of=') and commonly used input files like '/dev/zero' or '/dev/null'. The combination of these selections ensures that all processes involving overwriting files utilizing 'dd' are thoroughly examined. Given the capability of the 'dd' command to overwrite existing files and potentially delete valuable data, this rule is crucial for detecting unauthorized modifications that could lead to data loss or manipulation. The rule is set to a low severity, given that legitimate users may also engage in similar actions using the 'dd' command, leading to false positives in such cases.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1485
Created: 2021-10-15