
Summary
This rule detects the invocation of a shell via the `env` command in Linux environments. The specific command structure being monitored is where the process image ends with `/env`, and the command line arguments end with common shell interpreters such as `/bin/bash`, `/bin/dash`, `/bin/fish`, `/bin/sh`, or `/bin/zsh`. This pattern may be indicative of attempts to escape restricted shells, privilege escalation, or execution of unauthorized commands. Given that the `env` command is often utilized to set environment variables and run commands in a modified environment, its use in this context raises security flags. The detection condition is straightforward; it captures instances of the specified command syntax, which can often point to malicious activities or attempts to manipulate the operating environment.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2024-09-02