
Summary
This rule detects private key searching activity on Linux systems, which may indicate attempts by an attacker to escalate privileges or exfiltrate sensitive information. It uses the 'find' command to search for private key files such as 'id_dsa', 'id_rsa', and others in critical directories like `/home`, `/etc/ssh`, or `/root`. The rule operates with a risk score of 21 and requires data from Elastic Defend integrated via Fleet. It's pertinent primarily in the context of threat detection and incident response, allowing teams to monitor and investigate potential unauthorized access to sensitive key materials. The rule is designed to flag suspicious process executions to facilitate timely intervention during security incidents. Triage steps advise analysts to confirm the legitimacy of the command invoked, correlate user actions, and assess the environment for anomalies.
Categories
- Endpoint
- Linux
- Cloud
- On-Premise
Data Sources
- Process
- Application Log
- File
- Sensor Health
Created: 2024-11-04