heroui logo

Potential Linux Backdoor User Account Creation

Elastic Detection Rules

View Source
Summary
The rule 'Potential Linux Backdoor User Account Creation' is designed to detect attempts by attackers to create new backdoor user accounts by altering a user's UID to 0, effectively granting root access without using the root account itself. This behavior can be indicative of persistence mechanisms employed by attackers to maintain unauthorized access to a compromised system. The rule utilizes EQL (Event Query Language) to identify instances where the 'usermod' command is executed with specific arguments (-u 0) that indicate an attempt to assign UID 0 to a user account. The rule incorporates data from various integrations including Elastic Endgame, Sentinel One, and Crowdstrike to provide coverage across different logging sources. Investigation and response guidance are also provided, emphasizing the importance of prompt incident response and forensic analysis in the event of detection.
Categories
  • Linux
  • Endpoint
  • Other
Data Sources
  • Process
  • User Account
  • Container
  • Application Log
ATT&CK Techniques
  • T1136
  • T1136.001
Created: 2023-03-07