heroui logo

Linux Auditd At Application Execution

Splunk Security Content

View Source
Summary
This analytical rule detects the execution of the 'At' application in Linux environments, particularly focusing on the processes 'at' and 'atd'. The rule is significant because attackers may exploit this application to create persistence mechanisms on compromised hosts. By monitoring the execution of these processes, the analytic can identify potentially malicious activities indicative of unauthorized access or the deployment of malicious payloads. If malicious behavior is confirmed, it could lead to severe threats, including data theft or ransomware attacks. The detection rule aggregates data collected from Linux Auditd Syscall events, filtering for relevant user identifiers and utilizing Splunk for analysis and alerts. This helps administrators quickly assess and mitigate potential risks associated with unauthorized scheduling of commands.
Categories
  • Linux
  • Endpoint
Data Sources
  • Kernel
  • Logon Session
  • Process
ATT&CK Techniques
  • T1053
  • T1053.002
Created: 2024-11-13