heroui logo

Linux Auditd Dd File Overwrite

Splunk Security Content

View Source
Summary
The 'Linux Auditd Dd File Overwrite' rule detects the malicious use of the 'dd' command on Linux systems to overwrite files, which can lead to data destruction and significant operational disruptions. It leverages Linux Auditd telemetry to monitor process execution logs, specifically targeting command-line executions that reference the 'dd' command with output redirection ('of='), which is often indicative of attempts to overwrite existing files. The detection relies on carefully filtering through the execution logs for activities that meet these conditions. This proactive monitoring helps identify potential threats early, allowing for rapid response to malicious behaviors that may disrupt system availability. Adversaries often utilize the 'dd' command to erase data in covert operations, making this detection crucial for maintaining system integrity and protecting sensitive information.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Process
  • File
  • Command
ATT&CK Techniques
  • T1485
Created: 2024-11-13