
Summary
The 'Linux RPM Privilege Escalation' analytic is designed to detect the execution of the RPM Package Manager (RPM) with elevated privileges, specifically when it is used with the `--eval` and `lua:os.execute` options to run system commands as root. This detection leverages telemetry data from Endpoint Detection and Response (EDR) solutions, searching for specific command-line executions and relevant process metadata that might indicate an attempt at privilege escalation. Such activity is noteworthy as it can lead to unauthorized root access, potentially compromising the system and allowing access to sensitive information. The rule queries for processes that include certain command patterns that typically indicate the misuse of RPM in a security context. To be effective, logs must be ingested from EDR agents, normalized according to the Splunk Common Information Model (CIM), and structured properly to facilitate detection.
Categories
- Linux
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1548.003
- T1548
Created: 2024-11-13