
Summary
This rule is designed to detect suspicious network events related to the APT (Advanced Package Tool) package manager on Linux systems, which may signal the presence of a backdoor installed by an adversary for persistence. The APT package manager is integral for managing software on Debian-based systems, and attackers can compromise it by injecting malicious code into scripts that APT executes. The rule utilizes Elastic Query Language (EQL) to identify a sequence: it first checks if a shell execution is initiated by the APT process, followed within a short timeframe by any network connection attempts that are not targeting local or private IPs or related to expected operations like "/usr/bin/apt-listbugs". This detection aims to identify potential malicious activities that leverage APT for unauthorized access or commands, highlighting their potential evasion tactics and signaling the need for further investigation.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Network Traffic
- Container
ATT&CK Techniques
- T1543
- T1546
- T1546.016
- T1574
Created: 2024-02-01