heroui logo

Linux Auditd Possible Access To Credential Files

Splunk Security Content

View Source
Summary
This detection rule targets potential malicious access to sensitive credential files, specifically `/etc/passwd` and `/etc/shadow`, on Linux systems using the Linux Audit Daemon (auditd). The analytic focuses on methods commonly used to access these files such as the usage of commands like `cat`, `nano`, `vim`, and `vi`. This behavior is critical to monitor as it often signifies attempts at credential dumping—a technique leveraged by adversaries to gain persistent access or escalate their privileges within a system. If confirmed, this could lead to attackers obtaining hashed passwords worth cracking, thereby facilitating unauthorized access and increasing the risk of full system compromise.
Categories
  • Linux
  • Endpoint
Data Sources
  • Kernel
  • Process
  • File
ATT&CK Techniques
  • T1003
  • T1003.008
Created: 2025-01-27