heroui logo

Linux Node Privilege Escalation

Splunk Security Content

View Source
Summary
This detection rule identifies instances where Node.js is executed with elevated privileges (using sudo) on Linux systems. It specifically focuses on scenarios where Node.js spawns child processes through the 'child_process.spawn' method, which is a common technique employed by attackers. The rule utilizes data from Endpoint Detection and Response (EDR) tools, centering on command-line execution patterns that include specific Node.js commands indicative of potential malicious activity. Running Node.js as a superuser without properly dropping privileges can compromise system integrity by allowing unauthorized access to the file system and escalating privileges. Analysis of such behavior is critical because, if found malicious, it could enable attackers to execute arbitrary code and retain unauthorized access to sensitive data in the environment.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • Process
  • Command
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13