heroui logo

Linux Possible Cronjob Modification With Editor

Splunk Security Content

View Source
Summary
This detection rule identifies unauthorized modifications made to Linux cronjobs using common text editors such as 'nano', 'vi', or 'vim'. It targets command-line executions that interact with specific cronjob configuration paths, such as /etc/cron* and /var/spool/cron/*. This is particularly relevant for security operations centered around privilege escalation or establishing persistent access within a Linux environment, as such modifications can indicate an attacker’s attempt to execute cron-based attacks. If this malicious activity is confirmed, it poses a severe risk, potentially leading to data theft, system disruption, or broader network infiltration. The detection utilizes Sysmon for Linux events to monitor the relevant processes associated with cronjob modifications, providing crucial insights for timely response.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Process
ATT&CK Techniques
  • T1053
  • T1053.003
Created: 2024-12-19