heroui logo

Linux Auditd Possible Access To Sudoers File

Splunk Security Content

View Source
Summary
This detection rule focuses on monitoring access to the `/etc/sudoers` file on Linux systems, leveraging logs from Linux Auditd to identify potentially malicious activities. Processes such as `cat`, `nano`, `vim`, and `vi` are key indicators of interest as they are commonly used to read or modify this sensitive configuration file. The sudoers file plays a critical role in controlling user permissions for elevated command execution, and unauthorized access or modification could pose severe security risks such as privilege escalation or persistence installations by attackers. The search performs pattern matching against the paths of these interactions and aggregates data to identify anomalies over time. Since this detection operates on audit logs, effective preprocessing using the Splunk Add-on for Unix and Linux is required to facilitate accurate anomaly detection and ensure normalization of field names to the Common Information Model (CIM).
Categories
  • Linux
  • Endpoint
Data Sources
  • Script
  • Logon Session
  • Process
ATT&CK Techniques
  • T1548
  • T1548.003
Created: 2025-01-27