heroui logo

Linux Octave Privilege Escalation

Splunk Security Content

View Source
Summary
The 'Linux Octave Privilege Escalation' analytic performs detection of potentially malicious behavior on Linux systems using GNU Octave. This rule specifically looks for the execution of Octave with elevated privileges, especially when system commands are run through 'sudo' within the process command-line arguments. It captures specific command line patterns—namely, the presence of 'octave-cli', '--eval', 'system', and 'sudo'—to identify attempts where a user may be leveraging Octave to execute arbitrary commands with root permissions. Such activity can indicate unauthorised privilege escalation attempts, which pose a significant risk to systems, potentially allowing attackers to gain full control over compromised Linux environments. The rule relies on telemetry data collected through Endpoint Detection and Response (EDR) agents, focusing on Sysmon for Linux logs, thereby ensuring comprehensive coverage against potential threats originating from user activities within the system.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • User Account
  • Process
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13