heroui logo

Network Connection via Sudo Binary

Elastic Detection Rules

View Source
Summary
The rule detects network connections initiated by the 'sudo' binary on Linux systems, which is an unusual behavior potentially indicative of privilege escalation attempts through shellcode injection. By monitoring processes that invoke 'sudo', the rule can identify cases where attackers may be trying to establish unauthorized network connections after injecting malicious shellcode into a root-level process. The detection focuses on connections made to destination IPs that do not belong to standard internal ranges, thereby filtering out legitimate internal operations. Additionally, a comprehensive setup for Elastic Defend is outlined, requiring the integration of the Elastic Agent to capture relevant events. The associated threat assessment highlights risks linked to process injection and elevation abuse, emphasizing the importance of reviewing user activities and investigating alerts to mitigate false positives and genuine threats.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1055
  • T1055.008
  • T1548
  • T1548.003
Created: 2024-01-15