heroui logo

Local System Accounts Discovery - Linux

Sigma Rules

View Source
Summary
This detection rule titled 'Local System Accounts Discovery - Linux' targets the enumeration of local system accounts on Linux systems, a potential precursor to further malicious activities. The rule identifies processes that are involved in reading sensitive account information. It can detect actions where common commands such as 'cat', 'head', and 'vi' are used in conjunction with system files like /etc/passwd, /etc/shadow, and others that store user account data. The rule aggregates multiple selections, indicating a flexible detection mechanism based on various command-line patterns and image file names. It recognizes legitimate administrative activities as potential false positives, meaning that while rule triggers may occur commonly in normal operations, they are still worth monitoring for unusual deviations. The rule contributes to overall endpoint security by providing alerts on patterns indicative of local account discovery, which adversaries may exploit to expand their foothold within the system.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1087.001
Created: 2020-10-08