
Summary
This detection rule is designed to identify potential abuse of the Linux 'crash' utility, which is typically used for analyzing crash dump data or live systems. The rule focuses on the spawning of an interactive system shell via the 'crash' command line with the 'sh' process as a child, which deviates from standard usage by legitimate users or administrators. This unusual behavior may indicate that a malicious actor is attempting to escape a restricted environment to enhance their access capabilities. By monitoring for this specific event pattern, security teams can detect and respond to potential exploitation attempts related to Linux shell access.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
- Command
ATT&CK Techniques
- T1059
- T1059.004
Created: 2022-03-21