
Summary
The rule identifies attempts to exploit the Linux 'find' command to break out of restricted shell environments. The 'find' command, primarily used for searching files in a hierarchy, is misused here to execute a command (via '-exec') that spawns a new interactive shell (like '/bin/bash' or '/bin/sh'). This activity is atypical for legitimate users and may indicate a malicious actor trying to escalate their access privileges or operate beyond the restrictions imposed by the environment. The detection is achieved by monitoring events where a process of type 'start' involves 'bash' or 'sh' being spawned by 'find' under specific argument conditions.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1059
- T1059.004
Created: 2022-02-28