heroui logo

APT Package Manager Configuration File Creation

Elastic Detection Rules

View Source
Summary
This detection rule monitors for unauthorized file creation or modifications within the APT (Advanced Package Tool) configuration directory on Linux systems, specifically targeting the '/etc/apt/apt.conf.d/' path. APT is integral for handling package management on Debian-based distributions, and its configuration files are prime targets for attackers aiming to establish persistence by injecting malicious scripts. The rule is designed to generate alerts when file events are detected while excluding processes that are known legitimate APT operations, such as 'dpkg' or 'apt-get'. Key to this rule is its ability to discern potentially malicious activities from routine file operations, ensuring accurate threat detection. Unauthorized modifications could indicate attempts at backdooring or manipulation of the package management system, warranting immediate analysis and response actions.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1543
  • T1546
  • T1546.016
  • T1574
Created: 2024-06-03