heroui logo

Shell Invocation via Apt - Linux

Sigma Rules

View Source
Summary
This rule is designed to detect the invocation of shell commands through the 'apt' and 'apt-get' package management tools within Linux environments. The detection is triggered when these commands execute with a specific command line pattern that includes 'APT::Update::Pre-Invoke::='. The use of these commands in such a manner may indicate suspicious activities such as privilege escalation or attempts to execute unauthorized commands, potentially allowing attackers to break out of restricted environments. This rule is particularly relevant for monitoring environments that leverage 'apt' for package management, as it sheds light on potential abuse of commonly trusted administrative functions.
Categories
  • Linux
  • Cloud
  • On-Premise
Data Sources
  • Process
Created: 2022-12-28