
Summary
This detection rule identifies unauthorized modifications to the `ld.so.preload` file, which is critical in the Linux operating system for shared library preloading. Attackers may use this technique to inject malicious shared objects into running processes, thereby executing arbitrary code without directly compromising executables. The detection leverages the audit logs from `auditd`, a user-space component to the Linux kernel's auditing system. The rule is triggered when any modification to the `/etc/ld.so.preload` file is detected. Due to the sensitive nature of this file, any alteration should be scrutinized as it may signify potential insider threats or malicious activities aimed at bypassing standard security controls.
Categories
- Linux
- Endpoint
Data Sources
- File
- Logon Session
ATT&CK Techniques
- T1574.006
Created: 2019-10-24