
Summary
This detection rule aims to identify potential privilege escalation attacks on Linux systems through the misuse of SUID/SGID binaries. Attackers often exploit binaries with the SUID (Set User ID) or SGID (Set Group ID) permissions to execute commands with elevated privileges, wherein they can run processes that typically require root access. The rule flags instances where a process is executed with root privileges (indicated by user ID or group ID being 0) but where the real user or group ID is not root. This discrepancy suggests potential misuse of these binaries. The rule applies to processes that start around the time of the defined window, and it specifically looks for certain commands like `/bin/su`, `/usr/bin/sudo`, and several others associated with privilege escalation tasks. The detection logic involves filtering process events that fall outside the expected norms for authorized users, allowing for the early identification of suspicious activities before they can lead to security breaches. The rule integrates with Elastic Defend, which is required to monitor events effectively and send data to the Elastic Security app. The low severity rating suggests that although the behavior is suspect, it should be evaluated further to confirm an actual attack attempt.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
- Kernel
ATT&CK Techniques
- T1068
- T1548
- T1548.001
- T1218
Created: 2025-10-30