heroui logo

System Shutdown/Reboot - Linux

Sigma Rules

View Source
Summary
This detection rule focuses on identifying system shutdown or reboot activities on Linux systems, which may be indicative of malicious behavior by adversaries seeking to disrupt system operations or cause damage. The primary detection method involves monitoring the execution of specific commands related to shutting down or rebooting the system, including 'shutdown', 'reboot', 'halt', and 'poweroff'. In addition to these commands, the rule also checks for the invocation of 'init' or 'telinit' with the selection of runlevel 0 (halt) or 6 (reboot). The presence of these activities in audit logs is analyzed to determine if such commands were executed, thereby raising alerts where appropriate. As unauthorized shutdown or reboot activities can indicate a potential compromise, this rule plays a crucial role in security monitoring on Linux environments, especially in detecting attacks that aim to disrupt services or functions of the system.
Categories
  • Linux
  • Endpoint
  • On-Premise
Data Sources
  • Process
  • Application Log
  • User Account
  • File
ATT&CK Techniques
  • T1529
Created: 2020-10-15