
Summary
This rule is designed to detect suspicious child processes spawned by the Common UNIX Printing System (CUPS) daemon, referred to as cupsd. In a typical operating environment, the expected child processes of cupsd include backend processes that handle print jobs, such as '/usr/lib/cups/backend/usb' and filter processes like '/usr/lib/cups/filter/gstoraster'. These processes are crucial for managing printing tasks efficiently. However, the presence of unexpected child processes can indicate potential security threats such as unauthorized command execution or lateral movement within a network. Such processes may include common shell commands executed through '/bin/bash', network utilities like 'curl' or 'wget', or any unrelated processes that do not fit into the standard printing workflow. The detection logic employs Splunk query capabilities to analyze endpoint data, particularly filtering for instances where processes are executed under the 'cupsd' parent, specifically looking for malicious command patterns or behaviour indicating exploitation attempts. This is particularly relevant given CVEs from 2024, which report vulnerabilities in cupsd that could be leveraged by attackers.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Application Log
- User Account
ATT&CK Techniques
- T1190
Created: 2024-09-26