heroui logo

Linux Auditd Hidden Files And Directories Creation

Splunk Security Content

View Source
Summary
This detection rule is designed to identify suspicious activities on Linux systems related to the creation of hidden files and directories. Hidden files (those prefixed with a dot) can be utilized by attackers to hide malicious activities, data exfiltration logs, or malware, making detection a challenge for traditional security measures. The rule leverages the Linux Audit daemon (auditd) to monitor EXECVE system calls, targeting specific commands commonly associated with creating hidden files (like `touch`, `mkdir`, `vim`, etc.) while ensuring that the file names conform to the hidden file criteria. It thus plays a critical role in diminishing the dwell time of potential threats by alerting to unapproved creation of files that can conceal attacks or unauthorized actions.
Categories
  • Linux
  • Endpoint
Data Sources
  • Windows Registry
  • Script
  • File
  • Process
ATT&CK Techniques
  • T1083
Created: 2025-01-16