
Summary
This detection rule is designed to monitor for unauthorized attempts to extract sensitive information, specifically passwords, from files within a Linux environment. It focuses on identifying the usage of the 'grep' command that is executed in a way that looks for the term 'password' in files, which is a common technique employed by attackers to identify sensitive credentials that may be stored in plaintext. The rule operates by leveraging the EXECVE system call tracking enabled by the audit daemon (auditd) to capture and analyze executables being invoked in the system. When the system identifies a command that matches the defined search terms, specifically if it includes 'grep' alongside 'password', the rule will trigger, indicating potential credential access attempts. Given that this rule has a high severity level, false positives may occur; therefore, careful analysis is recommended before responding to alerts triggered by this rule.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
ATT&CK Techniques
- T1552.001
Created: 2020-10-15