heroui logo

Potential Discovery Activity Using Find - Linux

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious usage of the 'find' command on Linux systems, which can be employed by attackers to enumerate sensitive files or executables that may facilitate privilege escalation. The rule specifically monitors process creation events where the 'find' binary is invoked with certain command-line arguments typically associated with privilege escalation techniques, such as searching for setuid/setgid files or files with world-writable permissions. By tracking these specific command-line patterns, security teams can be alerted to atypical behavior that may signify compromised accounts or malicious insider activity attempting to discover exploitable files for further exploitation.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2022-12-28