
Summary
This rule detects potential tampering with cronjob files on Linux systems, specifically identifying sequences where 'echo' commands are used to append to existing cronjob files. Utilizing logs from Endpoint Detection and Response (EDR) agents, it analyzes process names, parent processes, and command-line actions. This type of activity is significant because malicious actors frequently exploit cronjobs for persistence or privilege escalation purposes. If such actions are verified as malicious, they could allow attackers to run unauthorized code automatically, leading to system breaches and unintended access to sensitive data. The rule provides insights into suspicious activities that may compromise systems and undermine organizational data integrity.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- Process
ATT&CK Techniques
- T1053
- T1053.003
Created: 2024-12-19