heroui logo

Linux Restricted Shell Breakout via the mysql command

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify potentially malicious use of the MySQL server in Linux environments. The rule specifically watches for instances where a new shell process (bash, sh, or dash) is spawned as a child of the MySQL process. This behavior is not a common practice for users or administrators managing MySQL databases, making it suspicious. The relevant indicators include the MySQL process being executed with the '-e' flag and containing arguments that invoke a shell. By monitoring for these conditions, the detection rule aims to uncover attempts by attackers to escape restricted environments and gain further control over the system. With a medium-risk score, this rule draws from established MITRE ATT&CK techniques for command and scripting interpreter abuse, indicating its alignment with recognized threat tactics.
Categories
  • Linux
  • Endpoint
  • Application
Data Sources
  • Process
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2022-03-09