
Summary
The rule titled 'Suspicious Passwd File Event Action' monitors the creation of password entries using the 'openssl' command, followed by unauthorized write activities to the '/etc/passwd' file on Linux systems. The '/etc/passwd' file is critical for managing user accounts and can be exploited by attackers who gain unauthorized access to add new entries, potentially allowing them to log in with root privileges. This detection leverages a sequence query in EQL to track events where 'openssl' is invoked with the 'passwd' argument by a non-root user, and subsequently checks for file write events to '/etc/passwd'. A minimum of two data sources is required for this rule to function: Elastic Defend and Auditd Manager. The rule operates with a risk score of 47, and the severity is classified as medium.
Categories
- Linux
- Endpoint
Data Sources
- User Account
- Process
- File
- Network Traffic
ATT&CK Techniques
- T1068
Created: 2024-01-22