
Summary
This detection rule identifies the creation or enabling of services on Linux platforms, particularly focusing on the use of the systemctl or service tools. By analyzing Endpoint Detection and Response (EDR) logs, it monitors process names, parent processes, and command-line executions used when starting or enabling services. Such activities are significant because they can indicate an adversary's attempt to maintain persistence or deploy malicious payloads. If confirmed as malicious, this behavior poses risks such as persistent access, data theft, or ransomware deployment. Therefore, it is crucial to monitor and investigate these activities to protect the integrity of the Linux environment.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Process
ATT&CK Techniques
- T1543
- T1053.006
- T1053
Created: 2024-11-13