heroui logo

Linux Restricted Shell Breakout via the find command

Elastic Detection Rules

View Source
Summary
The rule identifies attempts to exploit the Linux 'find' command to break out of restricted shell environments. The 'find' command, primarily used for searching files in a hierarchy, is misused here to execute a command (via '-exec') that spawns a new interactive shell (like '/bin/bash' or '/bin/sh'). This activity is atypical for legitimate users and may indicate a malicious actor trying to escalate their access privileges or operate beyond the restrictions imposed by the environment. The detection is achieved by monitoring events where a process of type 'start' involves 'bash' or 'sh' being spawned by 'find' under specific argument conditions.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2022-02-28