
Summary
This detection rule focuses on identifying attempts to disable services on Linux systems by monitoring processes associated with service management commands such as 'systemctl', 'service', and 'svcadm'. The rule leverages data from Endpoint Detection and Response (EDR) agents to identify potentially malicious activities where an attacker may attempt to disable critical services, possibly facilitating further nefarious actions while evading detection. Disabling such services can lead to a significant risk as it may allow adversaries to maintain undetected access and deploy attacks like data destruction or unauthorized service modifications. By incorporating this detection within the security monitoring framework, organizations can proactively alert on suspicious attempts to disable services and take corrective actions before any real damage occurs.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Process
ATT&CK Techniques
- T1489
Created: 2024-11-13