
Summary
This detection rule is designed to identify suspicious access patterns related to unauthorized attempts to find credentials stored within various password manager files on Linux systems. The analytic utilizes Linux Audit Daemon (auditd) logs that capture execution events of specific commands related to well-known password managers like KeePass, Dashlane, and others. By monitoring for processes executing filtering commands such as 'find' or 'grep' targeting these password manager file types, security teams can detect potential credential theft and take appropriate actions to mitigate the risk. The rule emphasizes the importance of monitoring unusual activity to preemptively guard against possible data breaches and loss of sensitive information.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- Container
- User Account
- File
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1555.005
- T1555
Created: 2025-01-16