
Summary
This detection rule is designed to monitor modifications to SSH Authorized Keys on Linux systems, a critical component for managing secure shell access. It utilizes data obtained from EDR agents specifically looking at process execution details such as the invocation of 'bash' and 'cat' commands that interact with 'authorized_keys' files. The alteration of these files is a common tactic employed by attackers to establish a foothold, ensure persistence, and bypass standard authentication methods. Hence, monitoring this behavior can help in detecting potential unauthorized access attempts. The detection logic aggregates process execution data, filtering on specific process names and file paths to identify and alert on suspicious activities.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- User Account
- Process
ATT&CK Techniques
- T1098.004
Created: 2024-11-13