heroui logo

Linux Setgid Capability Set on a Binary via Setcap Utility

Sigma Rules

View Source
Summary
This rule is designed to detect the use of the 'setcap' command on Linux systems to set the 'setgid' capability (cap_setgid) on binaries. The 'setcap' utility allows system administrators to define capabilities that processes can use, without granting them full root privileges. By enabling the 'setgid' capability, a non-privileged process or user could potentially manipulate Group IDs (GIDs), allowing them to execute operations that a standard user is typically restricted from performing. This could be exploited by attackers to install backdoors or achieve privilege escalation by modifying the GID to gain elevated access, such as utilizing GID 0 (the root group). The rule identifies this activity by monitoring for process creations involving 'setcap' and checking if the command line includes 'cap_setgid'. It operates within a rule set categorized under Linux process creation, alerting security teams to potentially suspicious behavior that may indicate an attempt to bypass security measures.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2026-01-24