heroui logo

Linux Auditd Clipboard Data Copy

Splunk Security Content

View Source
Summary
The 'Linux Auditd Clipboard Data Copy' detection rule identifies the use of the 'xclip' command to copy data from the clipboard, leveraging Linux Auditd telemetry to monitor process names and command-line arguments. This capability is crucial because attackers can exploit clipboard data to exfiltrate sensitive information, such as passwords and IP addresses. If such clipboard operations are confirmed as malicious, they may endanger the security of sensitive data, potentially allowing further exploitation and attacks in the targeted environment. The rule utilizes Splunk's monitoring tools to analyze audit logs, capturing relevant execution events in Linux systems, and provides insights into unauthorized data captures which necessitate prompt responses.
Categories
  • Endpoint
  • Linux
Data Sources
  • Kernel
  • Process
  • Logon Session
ATT&CK Techniques
  • T1115
Created: 2025-01-16