heroui logo

Linux Ruby Privilege Escalation

Splunk Security Content

View Source
Summary
This detection rule is designed to identify potential privilege escalation attempts on Linux systems by monitoring the execution of Ruby commands that are invoked with elevated privileges. Specifically, the rule targets instances where Ruby is executed using the `-e` flag in conjunction with `sudo`, which can allow a user to run commands with root access. It leverages telemetry from Endpoint Detection and Response (EDR) systems, focusing on processes that match a specific pattern involving Ruby and the `exec` and `sudo` commands. The identified behavior is crucial, as it may indicate malicious activity that could lead to a full system compromise, giving attackers control over compromised systems and enabling further exploitation or persistence efforts.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13