
Summary
The "Linux Sqlite3 Privilege Escalation" detection rule is designed to identify the misuse of the sqlite3 command executed with elevated privileges through the use of shell commands and 'sudo'. This type of activity is critical to monitor as it can indicate attempts to gain unauthorized root access on Linux systems, potentially leading to full system compromise. By leveraging Endpoint Detection and Response (EDR) telemetry, this rule focuses on instances where processes related to sqlite3 are invoked in conjunction with other commands that may escalate privileges. If this behavior is validated as malicious, attackers could execute arbitrary commands with administrative rights, thereby enabling data exfiltration or lateral movement across the network. Implementing this detection requires specific log ingestion and configuration within Splunk to ensure the proper identification of such anomalies.
Categories
- Linux
- Endpoint
Data Sources
- Script
- Process
ATT&CK Techniques
- T1548.003
- T1548
Created: 2024-11-13