heroui logo

Yum/DNF Plugin Status Discovery

Elastic Detection Rules

View Source
Summary
This detection rule aims to identify potential reconnaissance activity on Linux systems by monitoring for the use of the `grep` command specifically searching for plugin configurations related to YUM or DNF package managers. The rule focuses on processes where the `grep` command is executed with arguments that indicate an inquiry into the state and configuration of YUM or DNF plugins. Such activity is suspicious and may imply that an attacker is attempting to gather information for establishing persistence through malicious plugins. The rule utilizes EQL (Event Query Language) to filter events from multiple data indices, capturing processes associated with the `grep` command. It also includes guidance for investigating detected instances of this behavior, providing potential actions and considerations to validate the detected activity.
Categories
  • Linux
  • Endpoint
  • Other
Data Sources
  • Command
  • Process
  • Network Traffic
  • Application Log
  • File
ATT&CK Techniques
  • T1082
Created: 2024-06-25