
Summary
This detection rule is designed to identify the creation or modification of Git hook files on Linux systems, which can be a tactic used by attackers to maintain persistence. Git hooks are scripts that Git executes before or after events like commits or pushes and can automate tasks or enforce policies. Attackers may exploit these hooks to ensure their malicious code runs every time a specific Git event is triggered, compromising the integrity of the system. The rule enables monitoring for suspicious activities targeting `.git/hooks/*` paths and sets conditions to filter out benign processes that could cause false positives, ensuring that only potentially malicious activities are flagged. It operates within the Elastic Defend framework, requiring specific setup and integration steps to ensure proper monitoring of file events from multiple sources, including SentinelOne.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- File
- Process
- Cloud Service
ATT&CK Techniques
- T1543
- T1574
- T1059
- T1059.004
Created: 2024-06-26