
Summary
This rule is designed to detect instances when a Systemd service is reloaded or started on a Linux system. The detection is based on monitoring the audit logs for the execution of the 'systemctl' command, specifically looking for keywords that indicate either a 'daemon-reload' or a 'start' operation. These actions are commonly associated with both legitimate administrative tasks and potential malicious activity, making it crucial to identify them accurately. The rule examines the EXECVE events from the audit daemon (auditd) to capture relevant system calls executed by users. False positives can occur during the installation or legitimate reconfiguration of services, thus the detection is flagged with a low severity level. The rule is beneficial for environments where unauthorized service modifications may indicate persistence mechanisms being employed by attackers.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
- Logon Session
- Logon Session
ATT&CK Techniques
- T1543.002
Created: 2019-09-23