
Pluggable Authentication Module (PAM) Creation in Unusual Directory
Elastic Detection Rules
View SourceSummary
This detection rule identifies the creation of Pluggable Authentication Module (PAM) shared object files in atypical directory locations on Linux systems, where attackers may seek to establish persistence or harvest credentials. Malicious PAM files are often compiled in temporary or unconventional directories and later moved to the system directories, posing a substantial security threat. The rule utilizes EQL to query log data for file creations that match the naming convention 'pam_*.so', while filtering out legitimate processes and known safe directories. False positives may arise from trusted system updates or benign PAM module configuration changes. Consequently, this rule aids in identifying potentially malicious activities that deviate from official PAM usage patterns.
Categories
- Endpoint
- Linux
- Cloud
Data Sources
- File
- Container
- Application Log
ATT&CK Techniques
- T1543
- T1556
Created: 2024-12-16