heroui logo

Linux Preload Hijack Library Calls

Splunk Security Content

View Source
Summary
This detection rule identifies the use of the LD_PRELOAD environment variable in Linux systems, which is commonly exploited by threat actors to hijack or hook library functions. By leveraging endpoint detection and response (EDR) data, specifically focusing on process execution logs with full command-line details, the rule can effectively flag malicious attempts to manipulate processes for elevated privilege escalation or persistence on compromised systems. The analysis engages with Splunk's data models to extract relevant telemetry, highlighting the risk associated with such tactics. Given its significance in the realm of cyber-attacks, confirmation of malicious use could lead to serious repercussions such as arbitrary code execution and sustained access by adversaries.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Process
ATT&CK Techniques
  • T1574.006
  • T1574
Created: 2025-01-27