
Summary
This detection rule is designed to identify potentially malicious use of the MySQL server in Linux environments. The rule specifically watches for instances where a new shell process (bash, sh, or dash) is spawned as a child of the MySQL process. This behavior is not a common practice for users or administrators managing MySQL databases, making it suspicious. The relevant indicators include the MySQL process being executed with the '-e' flag and containing arguments that invoke a shell. By monitoring for these conditions, the detection rule aims to uncover attempts by attackers to escape restricted environments and gain further control over the system. With a medium-risk score, this rule draws from established MITRE ATT&CK techniques for command and scripting interpreter abuse, indicating its alignment with recognized threat tactics.
Categories
- Linux
- Endpoint
- Application
Data Sources
- Process
ATT&CK Techniques
- T1059
- T1059.004
Created: 2022-03-09