heroui logo

Linux Crypto Mining Indicators

Sigma Rules

View Source
Summary
The 'Linux Crypto Mining Indicators' rule is designed to detect potential crypto mining activity on Linux systems by analyzing command line parameters and strings that are characteristic of crypto miners. The rule looks for several distinct command line patterns often associated with mining operations, such as options for CPU priorities, donation levels to pools, specific mining algorithms, and communication protocols (such as stratum over TCP/UDP). The detection leverages the evidence from process creation logs to identify these command characteristics, allowing for the identification of unauthorized or malicious crypto-mining activities. This rule is categorized as a high-level threat due to the potential impact on system resources and infrastructure, particularly in an enterprise setting where crypto mining can lead to service degradation and additional security risks if left unmonitored. Although legitimate cryptocurrency usage may trigger alerts, the potential for abuse necessitates vigilant detection mechanisms. Organizations should look into their usage policies regarding crypto mining to avoid false positives while maintaining protective measures against unauthorized activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2021-10-26