
Summary
The Linux Auditd Edit Cron Table Parameter analytical rule is designed to monitor and detect unauthorized changes made to cron jobs on Linux systems via the command-line parameter for editing (`-e`). This rule leverages system call logging through Linux Audit Daemon (auditd) to capture command executions that involve `crontab` and scrutinizes the associated user IDs to filter out standard operations, specifically excluding actions performed by the `daemon` user. Manipulating cron jobs can signify persistent threats or scheduled malicious tasks, making it essential for security operations centers (SOCs) to monitor these events closely. The search query aggregates and summarizes relevant activities, showcasing when and by whom these actions were performed, which can empower SOC analysts to respond swiftly to possible breaches. Implementing this detection requires ingestion of auditd data with attention to normalization of fields to ensure compatibility with the Splunk Common Information Model (CIM).
Categories
- Linux
- Endpoint
Data Sources
- Kernel
- Process
ATT&CK Techniques
- T1053
- T1053.003
Created: 2024-11-13