heroui logo

Git Hook Command Execution

Elastic Detection Rules

View Source
Summary
The Git Hook Command Execution rule is designed to detect potentially malicious commands executed through Git hooks on Linux systems. Git hooks are scripts that Git runs before or after events, such as commits and pushes. However, an attacker can abuse them for persistent execution of arbitrary commands. This EQL-based detection rule identifies suspicious processes that are initiated from Git hooks by analyzing the process' parent-child relationships and command arguments associated with the invocation of these hooks. The rule relies on data from the Elastic Defend and SentinelOne, monitoring specific process events to flag potential abuse effectively. The summary emphasizes the importance of monitoring Git activity for security, with a focus on maintaining detection accuracy and managing false positives in a development environment.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1543
  • T1574
  • T1059
  • T1059.004
Created: 2024-07-15