
Summary
This detection rule is designed to identify when a user modifies or deletes system log files on a Clear Linux system. The rule leverages a combination of known commands and processes frequently associated with log alteration or removal, such as 'vi', 'vim', 'nano', 'echo', 'shred', and 'rm'. It uses the Splunk logic to scan for these commands in conjunction with multiple log files that are critical for system auditing, including 'auth.log', 'secure', and 'syslog'. The rule aims to catch attempts to obscure user activities and system events by either clearing logs or redirecting output to /dev/null, thus preventing legitimate logging. By monitoring command-line parameters and extracting this activity from EDR logs, this rule plays a crucial role in event monitoring and enhances security posture against evasion techniques that threat actors may employ during an incident response.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1070.003
- T1070.002
- T1070.004
Created: 2024-02-09