heroui logo

Linux Auditd Find Credentials From Password Stores

Splunk Security Content

View Source
Summary
The detection rule "Linux Auditd Find Credentials From Password Stores" is designed to identify suspicious activities related to the access and manipulation of password stores on Linux systems. It is based on monitoring audit logs generated by the Linux Audit daemon (Auditd), specifically looking for process execution attempts that include key terms associated with credential retrieval, such as 'find', 'grep', 'password', and other relevant keywords. The analytic focuses on capturing unusual patterns of process execution that suggest an attacker might be attempting to extract sensitive credentials stored within these repositories. Given that unauthorized access to password stores can facilitate significant security breaches, this analytic aims to provide timely alerts to security teams, enabling them to respond effectively to potential credential theft attempts. It employs Splunk's infrastructure for log ingestion and normalization, enhancing the detection capabilities across multiple endpoints that leverage Auditd.
Categories
  • Linux
  • Endpoint
Data Sources
  • Logon Session
ATT&CK Techniques
  • T1555.005
  • T1555
Created: 2025-01-16