
Summary
The detection rule focuses on identifying potentially malicious network connections initiated through XDG (Cross-Desktop Group) autostart entries in Linux-based GNOME and XFCE environments. These autostart entries allow programs and scripts to execute automatically upon user login, facilitating persistence methods employed by attackers. This rule leverages EQL (Event Query Language) to monitor processes that link to XDG autostart scripts and subsequent outbound network activities. Network connections that are initiated by processes associated with known legitimate parent executables, such as 'xfce4-session', are allowed, while those from untrusted sources, such as external IP addresses or unusual command line arguments, are flagged. The rule provides a mechanism for detecting manipulation of autostart entries that can lead to unauthorized persistence on compromised systems and offers guidance on setup, investigation, and response to identified threats.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- Network Traffic
- Application Log
- User Account
- File
ATT&CK Techniques
- T1547
- T1547.013
Created: 2024-06-03