heroui logo

Disabling Security Tools

Sigma Rules

View Source
Summary
This detection rule is designed to identify and alert on attempts to disable security tools in a Linux environment. It focuses specifically on the processes related to firewall management and endpoint security, such as iptables, firewalld, Carbon Black, and CrowdStrike Falcon. The rule triggers if processes associated with these tools are executed with commands indicating they are to be stopped or disabled. For example, if a command to stop or disable iptables or firewalld is detected, this rule activates. The rule is particularly relevant in scenarios of defense evasion where an attacker attempts to disable security measures to facilitate further malicious actions. Given the medium level of significance, it is advisable to monitor these events closely as they may indicate potential threats or improper configurations. The rule is part of a broader set of techniques outlined in ATT&CK framework, specifically T1562.004, which relates to the evasion of security defenses.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1562.004
Created: 2020-06-17