heroui logo

Shell Execution via Git - Linux

Sigma Rules

View Source
Summary
This detection rule identifies the execution of shell commands through the `git` utility on Linux systems. It specifically looks for process creation events where the parent process is `git`, and the command line arguments indicate that the invoked command attempts to spawn a shell (e.g., using redirection techniques like `0<&1`). Such behavior can indicate an attempt to escalate privileges, execute unauthorized commands, or bypass restrictions in secure environments. The rule leverages specific parent command line signatures, targeting scenarios where `git` is used in conjunction with common shell invocation patterns. Security professionals must monitor these behaviors closely as they may signify attempts to exploit vulnerabilities in the system or carry out malicious activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2024-09-02