
Summary
The detection rule for "Unusual Linux Process Discovery Activity" identifies potential anomalies in process discovery commands executed by unusual user accounts. It leverages machine learning to analyze patterns defined as acceptable versus those that fall outside this norm, especially aiming to detect unauthorized access typically associated with compromised accounts. The rule addresses possible scenarios where a threat actor may utilize process discovery commands for gathering intelligence about running applications on a compromised host, and potentially preparing for privilege escalation or establishing persistence mechanisms. The risk score is classified as low (21), making it important but not critical for immediate action. The rule requires data integration from Elastic Defend and Auditd Manager for effective monitoring and analysis. False positives can arise from routine administrative tasks. To mitigate operational disruptions, the setup allows for exception handling. This setup provides end users with detailed processes for integrating and deploying necessary components, ensuring effective and accurate monitoring of system activities. Triage and investigation steps aim to empower security teams to discern between legitimate system management tasks versus potentially malicious behavior.
Categories
- Linux
- Endpoint
- Cloud
- On-Premise
Data Sources
- Process
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1057
Created: 2020-09-03