heroui logo

Shell Execution via Nice - Linux

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the use of the 'nice' utility for executing shell processes in Linux environments. The 'nice' command is typically used to adjust the priority of processes but can also be exploited for privilege escalation or unauthorized command execution. By monitoring instances where 'nice' is coupled with common shell paths in command line executions (such as '/bin/bash', '/bin/dash', '/bin/fish', '/bin/sh', and '/bin/zsh'), this rule aims to flag potentially malicious activity that could indicate efforts to break out of restricted shell environments or escalate privileges. The rule is classified as high severity due to the potential impact of such actions and is intended for use in environments where Linux process creation is monitored.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Process
Created: 2024-09-02