heroui logo

Linux MySQL Privilege Escalation

Splunk Security Content

View Source
Summary
The 'Linux MySQL Privilege Escalation' detection rule identifies instances where MySQL commands are executed with elevated privileges through the use of 'sudo'. By analyzing process execution logs collected via Endpoint Detection and Response (EDR) agents, this analytic focuses on specific command structures suggesting anomalies that may indicate malicious activities. The searches are designed to capture commands that execute MySQL with elevated permissions, which can lead to unauthorized access or exploitation of system resources, thereby enabling attackers to gain root access and control over the system. Failure to detect such activity could result in severe security breaches, as it enables attackers to execute arbitrary commands at a system level. It is important to implement this detection with proper logging and normalization of data through Splunk's Common Information Model (CIM). Also, consider potential false positives from legitimate administrative activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Process
  • Application Log
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13