
Summary
This rule detects the creation of D-Bus service files on Linux systems by actively monitoring specific directories where such files are typically located. D-Bus acts as a message bus for inter-process communication, allowing applications to communicate and utilize services effectively. Attackers can exploit this functionality by creating unauthorized service files, potentially leading to persistence mechanisms or privilege escalation within the system. The rule aims to flag any file creation events for service file types that occur outside known legitimate package managers and service executables, thus identifying possible malicious activity. A thorough investigation of the process that triggered the creation is crucial, including verifying the executable and the context of file creation. The rule integrates with Elastic Defend and requires proper configuration of the Elastic Agent to monitor file system events and send alerts for anomalous activity. It includes setup instructions and considerations for avoiding false positives associated with legitimate package manager operations or system service updates.
Categories
- Linux
- Endpoint
Data Sources
- File
- Process
- Application Log
- User Account
ATT&CK Techniques
- T1543
Created: 2025-01-16