
Summary
The "SSL Certificate Deletion" rule detects malicious deletion of SSL certificates on Linux systems, which may indicate attempts to undermine trust controls and disrupt secure communications. By leveraging file events specifically targeting deletions within the directory `/etc/ssl/certs/`, the rule filters for file types that are associated with SSL certificates, namely `pem` and `crt`. It excludes common benign processes like `dockerd` and `pacman` to reduce false positives. The use of Elastic Defend integration with the Elastic Agent ensures that activities are monitored effectively; however, proper configuration and system exclusions are essential to maintain accurate detection capabilities. Investigation of any alerts generated by this rule should involve analyzing the context of the deletion, the actions of user accounts involved, and reviewing system logs for any related suspicious activities.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
- User Account
ATT&CK Techniques
- T1070
- T1070.004
- T1553
- T1485
Created: 2024-08-28