heroui logo

Linux APT Privilege Escalation

Splunk Security Content

View Source
Summary
The 'Linux APT Privilege Escalation' detection rule identifies the use of the Advanced Package Tool (APT) with elevated privileges through the sudo command on Linux systems. This analytic uses Endpoint Detection and Response (EDR) telemetry to monitor processes where APT commands are executed with sudo rights, indicating potential unauthorized access and privilege escalation. Specifically, it targets instances where the APT command is run in a way that suggests elevated permissions, which could allow an attacker to gain root access, execute arbitrary commands, and thus take control of the system. This rule is crucial for detecting anomalies in user behaviors that could lead to serious security breaches.
Categories
  • Linux
  • Endpoint
Data Sources
  • Script
  • Process
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13