
Summary
This detection rule aims to identify potential data compression activities on Linux systems that might indicate an adversary preparing sensitive data for exfiltration. The rule focuses on three main selections: the use of 'zip' command, 'gzip' command with the '-k' option, and 'tar' command with a '-c' (create) operation. Each selection checks for execution events related to these commands, leveraging Linux's auditd logging framework which monitors system calls related to file and process activities. If one or more of these commands are invoked by a process, it could suggest that data is being compressed in preparation for unauthorized data transfer. This rule is particularly vigilant against unusual or unauthorized use of archiving tools, though it acknowledges that legitimate users might also use these commands for valid reasons, thereby categorizing the false positive risk as low.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- File
- Application Log
ATT&CK Techniques
- T1560.001
Created: 2019-10-21