
Summary
The 'Linux Auditd File And Directory Discovery' rule is designed to identify suspicious activities indicative of file and directory discovery on Linux systems, which may signal an attacker's reconnaissance efforts. Such activities typically precede data exfiltration attempts as adversaries seek out sensitive files. The rule leverages data from the Linux Auditd system to monitor 'execve' calls that utilize common file discovery commands like 'find' and 'grep'. It creates alerts based on attempts to access various sensitive file types (e.g., images, documents, and other media formats). By detecting unusual patterns in file access, security teams can take timely action to mitigate potential breaches or unauthorized access. This analytic emphasizes the need for continuous monitoring of Linux endpoints to safeguard valuable data against potential threats.
Categories
- Linux
- Endpoint
Data Sources
- Kernel
- File
ATT&CK Techniques
- T1083
Created: 2025-01-15