
Summary
This detection rule is designed to identify potentially malicious activity on Linux and macOS systems where the curl command is used to download a file from an external source and immediately pipe it to bash for execution. This behavior is often linked to nefarious activities such as exploitation of vulnerabilities, particularly the Log4j vulnerability (CVE-2021-44228), and actions taken by coinmining malware. The detection utilizes telemetry from Endpoint Detection and Response (EDR) solutions focusing on key elements including process names, command-line arguments, and parent processes. By monitoring these parameters, the rule can pinpoint instances where a remote file is being executed, which may result in unauthorized code execution and subsequent system compromise. Given that this technique is a common method employed by threat actors to exploit system vulnerabilities, swift detection and response to these findings are essential for maintaining security integrity.
Categories
- Endpoint
- macOS
- Linux
Data Sources
- Process
- File
- Cloud Service
ATT&CK Techniques
- T1105
Created: 2024-12-10