
Summary
The 'Linux Stop Services' detection analytic is aimed at identifying unauthorized attempts to stop critical services on Linux systems, which is a common adversarial tactic to disable security protections and disrupt operations. It employs telemetry data from Endpoint Detection and Response (EDR) agents, specifically monitoring processes that utilize 'systemctl', 'service', and 'svcadm' command to execute stop commands. This is crucial because malicious actors, such as those employing Industroyer2 malware, often target service management commands to hinder security mechanisms, helping them maintain persistence or execute further malicious actions that may lead to severe impacts like system unavailability. The rule analyzes subprocess activity related to service interruptions and prioritizes visibility on user actions that correlate with suspicious service management processes, potentially exposing an ongoing attack.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Service
ATT&CK Techniques
- T1489
Created: 2024-11-13