
Summary
This rule identifies potential abuse of the Linux Magic SysRq (System Request) key, which can be exploited by adversaries with root access or sufficient privileges. The detection monitors unauthorized writes to the `/proc/sysrq-trigger`, `/proc/sys/kernel/sysrq`, and `/etc/sysctl.conf` files using Linux's audit framework (auditd). By tracking such activities, the rule aims to uncover stealthy post-exploitation maneuvers that could lead to system instability, process termination, or evasion of standard logging mechanisms. This enhances the monitoring capabilities of Linux endpoints, specifically for activities that can manipulate critical system parameters in a malicious manner.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- File
- Process
- Application Log
- Logon Session
ATT&CK Techniques
- T1059.004
- T1529
- T1489
- T1499
Created: 2025-08-28