
Summary
The 'Kill Command Execution' detection rule identifies the execution of critical commands on Linux systems, specifically the kill, pkill, and killall commands. These commands are commonly used to terminate processes, which can be abused by attackers aiming to disable security tools or disrupt processes that may hinder their malicious operations. The rule is implemented using queries that analyze process execution events, specifically looking for instances where these commands are executed. It is tailored to operate effectively within environments utilizing Elastic Defend, requiring integration through Elastic Agent, which should be managed using Kibana for streamlined monitoring and alerting. The rule is categorized with a low risk score of 21, indicating that while it is significant, it does not represent an immediate threat without further context. The detection is tied to MITRE ATT&CK techniques for Defense Evasion and Execution, providing visibility into potential threats and aiding in the enhancement of security postures against process termination activities.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Application Log
- File
ATT&CK Techniques
- T1564
- T1564.001
- T1562
- T1562.006
- T1059
- T1059.004
Created: 2025-02-21