
Summary
This analytic detection focuses on identifying privilege escalation attempts in Linux systems through the RubyGems utility. Specifically, it alerts on the execution of the command `gem open -e` in conjunction with `sudo`, which indicates that a user is attempting to run system commands with elevated privileges. This is notable as it can lead to unauthorized root access, potentially allowing an attacker to execute arbitrary commands. By leveraging data captured from Endpoint Detection and Response (EDR) agents, this detection rule processes command-line execution logs to pinpoint such risky behaviors. Ensuring that EDR agents are correctly configured to capture relevant process details and command executions is essential for effective detection.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Process
ATT&CK Techniques
- T1548.003
- T1548
Created: 2024-11-13