
Summary
This detection rule identifies attempts by adversaries to disable IPTables or firewall services on Linux systems, a common tactic in defense evasion strategies. These activities may allow attackers to bypass network security controls and facilitate unauthorized access or malicious activities. The rule looks for specific command executions associated with disabling firewall configurations, such as commands that flush IPTables rules or stop firewall services. By monitoring processes started with certain arguments, this rule helps in early identification of suspicious actions potentially indicative of malicious behavior. Investigation guidelines assist analysts in verifying if the detected processes were legitimate administrative actions or hostile moves, along with providing suggestions for managing false positives and ensuring effective incident response.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Command
- Logon Session
- Network Traffic
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2023-02-22