heroui logo

Linux Restricted Shell Breakout via awk Commands

Elastic Detection Rules

View Source
Summary
This rule identifies potentially malicious usage of the `awk` utility in Linux systems. Specifically, it looks for cases where the `awk` binary is used to spawn an interactive shell, which is not a standard usage scenario. The rule examines process events to detect when processes starting with shell interpreters like `sh`, `bash`, or `dash` have a parent process that is one of the `awk` variants (`nawk`, `mawk`, `awk`, `gawk`). A critical condition for detection is the presence of commands in the parent process arguments that indicate an attempt to execute a system shell via special scripting. The rule links this behavior to MITRE ATT&CK techniques under the Execution tactic, particularly focusing on command and scripting interpreters, highlighting its relevance in detecting breakouts from restricted environments.
Categories
  • Linux
  • Endpoint
  • Other
Data Sources
  • Process
  • Logon Session
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2022-02-24