heroui logo

Linux Auditd Database File And Directory Discovery

Splunk Security Content

View Source
Summary
The "Linux Auditd Database File And Directory Discovery" detection is an anomaly-based analytic designed to uncover potentially malicious activities involving database file and directory discovery on Linux systems. This type of behavior is indicative of a reconnaissance phase, wherein an attacker attempts to locate and assess database assets that could be targeted for data theft or unauthorized access. By monitoring for unusual command executions tied to file operations, particularly those associated with common database extensions (.db, .sql, .sqlite, etc.), this analytic provides a vital layer of security by enabling earlier detection of potential threats. Such proactive surveillance allows security teams to act swiftly to avert escalated attacks, thus mitigating risks associated with compromised systems.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • File
  • Process
ATT&CK Techniques
  • T1083
Created: 2025-01-15