heroui logo

Suspicious Invocation of Shell via AWK - Linux

Sigma Rules

View Source
Summary
This threat detection rule focuses on identifying suspicious activity related to the execution of the `awk` command in Linux environments, particularly when it is used to invoke a shell using the `system()` function. This behavior is often linked to attempts at arbitrary command execution or privilege escalation, which could lead to unauthorized access or further exploitation of the system. The rule uses process creation logs to detect when `awk`, along with its variants like `gawk`, `mawk`, and `nawk`, are running and attempting to execute shell commands through specific command line patterns. Detection is triggered when the command line used by the `awk` variant contains the string "BEGIN {system" and is followed by subsequent commands that indicate an attempt to invoke a shell. The detection strategy is particularly important for environments that are at risk of compromise due to malicious actors attempting to execute unauthorized scripts or commands.
Categories
  • Linux
Data Sources
  • Process
Created: 2024-09-02