heroui logo

Linux Possible Access To Sudoers File

Splunk Security Content

View Source
Summary
This detection rule identifies potential unauthorized access or modifications to the /etc/sudoers file on Linux systems. The sudoers file is critical for regulating user permissions to execute commands with elevated privileges. Analyzing telemetry from Endpoint Detection and Response (EDR) agents, this rule specifically focuses on commands commonly used to access or edit this file, including 'cat', 'nano', 'vim', and 'vi'. If this activity is validated as malicious, it could indicate attempts by an attacker to establish persistence or escalate their privileges at the compromised host. The search logic employed in this detection utilizes the Splunk data model for Endpoint Processes and checks for the relevant process names and their interactions with the target file.
Categories
  • Linux
  • Endpoint
Data Sources
  • User Account
  • Process
ATT&CK Techniques
  • T1548
  • T1548.003
  • T1003.008
Created: 2025-01-27