
Summary
This detection rule alerts on the deletion of init daemon scripts within the /etc/init.d/ directory on Linux systems, leveraging Sysmon for Linux event logs. Such actions are critical to monitor because init scripts control essential services; their removal can indicate an attacker attempting to disable or manipulate service behavior, potentially allowing for privilege escalation or evasion of security mechanisms. The search query provides an hourly breakdown of deleted files in this directory, helping security analysts identify potentially malicious behavior quickly. Additionally, thorough documentation and testing, including false positive handling, ensure that legitimate administrative actions do not trigger alerts unnecessarily.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- File
- Process
- Command
ATT&CK Techniques
- T1485
- T1070.004
- T1070
Created: 2024-11-13