
Summary
The Linux Clipboard Data Copy detection rule identifies anomalous use of the 'xclip' command through EDR telemetry. This command is often used to manipulate clipboard data, which can be exploited by attackers to exfiltrate sensitive information such as passwords and personal data. The analytic scans for specific command-line arguments associated with the 'xclip' process. Detection is focused on the Processes data model, which captures details about the running commands and their contexts, such as user and parent process. It highlights a significant threat vector, particularly on Linux systems, where clipboard functionality can be misused. By detecting clipboard activities, this rule helps organizations protect against unauthorized data transfers and potential insider threats.
Categories
- Linux
- Endpoint
Data Sources
- Process
- User Account
- Application Log
ATT&CK Techniques
- T1115
Created: 2024-11-13