heroui logo

Shell Execution via Rsync - Linux

Sigma Rules

View Source
Summary
This rule is designed to detect instances where the 'rsync' utility is being used to execute a shell, which could signal attempts at privilege escalation or unauthorized command execution. The detection logic is structured to analyze process creation events specifically looking for command lines that indicate the invocation of a shell through rsync. The key indicators are the usage of the `-e` option in combination with recognized shell processes such as bash, sh, and others. Additionally, both the image name and command line arguments are evaluated to confirm that they correspond with expected patterns of abusive rsync usage. While rsync can be used legitimately, this detection rule highlights potential misuse and the high level of such events signifies the importance of immediate scrutiny and response.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2024-09-02