
Summary
This detection rule is designed to identify suspicious activities on Linux systems related to the creation of hidden files and directories. Hidden files (those prefixed with a dot) can be utilized by attackers to hide malicious activities, data exfiltration logs, or malware, making detection a challenge for traditional security measures. The rule leverages the Linux Audit daemon (auditd) to monitor EXECVE system calls, targeting specific commands commonly associated with creating hidden files (like `touch`, `mkdir`, `vim`, etc.) while ensuring that the file names conform to the hidden file criteria. It thus plays a critical role in diminishing the dwell time of potential threats by alerting to unapproved creation of files that can conceal attacks or unauthorized actions.
Categories
- Linux
- Endpoint
Data Sources
- Windows Registry
- Script
- File
- Process
ATT&CK Techniques
- T1083
Created: 2025-01-16