heroui logo

Suspicious APT Package Manager Network Connection

Elastic Detection Rules

View Source
Summary
This rule is designed to detect suspicious network events related to the APT (Advanced Package Tool) package manager on Linux systems, which may signal the presence of a backdoor installed by an adversary for persistence. The APT package manager is integral for managing software on Debian-based systems, and attackers can compromise it by injecting malicious code into scripts that APT executes. The rule utilizes Elastic Query Language (EQL) to identify a sequence: it first checks if a shell execution is initiated by the APT process, followed within a short timeframe by any network connection attempts that are not targeting local or private IPs or related to expected operations like "/usr/bin/apt-listbugs". This detection aims to identify potential malicious activities that leverage APT for unauthorized access or commands, highlighting their potential evasion tactics and signaling the need for further investigation.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Network Traffic
  • Container
ATT&CK Techniques
  • T1543
  • T1546
  • T1546.016
  • T1574
Created: 2024-02-01