
Summary
This rule is designed to monitor and detect suspicious changes to sensitive or critical files on a Linux system. The rule presents a mechanism that identifies unexpected modifications or access to files that are typically not altered without specific planning. File integrity monitoring is essential for protecting the integrity of configurations and other critical files that could be targeted by an attacker or modified without authorization. The conditions for triggering alerts involve specific executable commands (such as /cat, /echo, /grep) that are commonly used to manipulate file content, combined with capturing paths that correspond to sensitive file locations like configurations under /etc or binaries under /usr/bin. The detection logic ensures it will only trigger if at least one command from the defined set is used with an attempt to write or redirect output to these sensitive paths.
Categories
- Linux
- Endpoint
Data Sources
- Process
Created: 2023-05-30