heroui logo

Linux Auditd Service Started

Splunk Security Content

View Source
Summary
This detection rule monitors for suspicious service start events on Linux systems via the Linux Audit Daemon (auditd). By analyzing logs of command executions captured by auditd, the rule identifies when commands associated with services being started or enabled (via 'systemctl' or 'service' commands) are executed. Given that these actions may indicate potential unauthorized access or the establishment of persistence techniques by attackers, such monitoring is crucial for proactive security measures. If these events are confirmed as malicious, they can signify a compromised system or unauthorized access to sensitive data, warranting prompt investigation and response from the SOC. The implementation involves using the Splunk Add-on for Unix and Linux to ingest and normalize auditd data, allowing for efficient pattern detection aligned with the Splunk Common Information Model.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Logon Session
  • Process
ATT&CK Techniques
  • T1569.002
  • T1569
Created: 2024-11-13