
Summary
This detection rule is designed to identify potentially malicious actions where users are added to privileged groups (specifically 'root' or 'sudoers') utilizing the 'usermod' binary in Linux systems. The rule looks for processes that invoke 'usermod' with command line parameters indicating that a user is being appended to the 'root' or 'sudoers' groups. This activity can signify an attempt by an attacker to escalate privileges, granting wide-ranging access to the system. It is important to monitor these changes, as they can represent unauthorized adjustments to user access levels, potentially leading to permanent access for malicious actors or enabling other harmful activities.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2022-12-21