
Summary
This detection rule focuses on identifying potential code injection attacks targeting Linux processes via the 'dd' utility. The rule is built upon the understanding that an attacker can overwrite a process's memory map using the 'dd' command, specifically through arguments that manipulate memory segments directly. This technique falls under the category of process creation events and can be indicative of advanced persistent threats that utilize process memory manipulation for stealth operations or privilege escalation. The rule filters for command lines that include the '/proc/' file system, particularly looking for instances where the 'dd' command accesses memory through the '/mem' file of a target process, providing a systematic approach to detect unauthorized memory overwriting attempts.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
- Command
Created: 2023-12-01