heroui logo

Use Of Hidden Paths Or Files

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the use of hidden paths or files within Linux systems using the auditd logging service. Specifically, it is designed to capture system calls that attempt to access files located in hidden directories (directories starting with a dot) or files that themselves are hidden. The primary detection method involves monitoring events where the file type is 'PATH' and the file name contains a slash followed by a dot (indicating a hidden file) while not being part of commonly-used hidden directories like '.cache', '.config', '.pyenv', or the toolchain directory of '.rustup'. This rule plays a critical role in operational security by flagging behavior that may indicate evasion tactics by threat actors trying to access or execute hidden files, which is often a precursor to malicious activity or lateral movement within a system.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1564.001
Created: 2022-12-30