heroui logo

Suspicious Path Mounted

Elastic Detection Rules

View Source
Summary
This detection rule identifies suspicious use of the 'mount' command in a Linux environment, which could indicate malicious activity related to data exfiltration or persistence. The rule operates by analyzing process events that specify the execution of the 'mount' command, particularly when it's used to attach paths that might be indicative of potential attacks, such as temporary directories and device files. The EQL (Event Query Language) query specifies conditions where the command is invoked, ensuring the parent process is not a legitimate system executable, enhancing detection capabilities against potential evasion techniques. The use of risk scoring and a low severity designation indicates this rule can help prioritize alerts based on the context of detected activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Sensor Health
ATT&CK Techniques
  • T1564
Created: 2025-04-25