
Summary
The detection rule titled 'Potential Execution via XZBackdoor' identifies suspicious SSH activity on Linux systems by monitoring for anomalies in the sshd process executions. The rule looks for scenarios where the sshd service terminates shortly after executing a command, which is characteristic of backdoor operations. It uses EQL to analyze logs collected from endpoints, tracking process sequences and filtering based on specific criteria that indicate potential use of malicious executables. With a high severity rating and a risk score of 73, the rule aims to detect the exploitation of SSH for unauthorized access, notably tasks akin to those performed by the XZ backdoor. The rule provides guidance for investigation and remediation in the event of detection, emphasizing the need to examine command histories, logged SSH sessions, and network activities. It is designed to alert security teams to potential persistence or credential access threats stemming from malicious SSH executions.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1543
- T1556
- T1021
- T1021.004
- T1563
- T1563.001
Created: 2024-04-01