heroui logo

Sudoers File Modification

Elastic Detection Rules

View Source
Summary
The 'Sudoers File Modification' detection rule aims to identify unauthorized changes to the sudoers file, which is critical in controlling user permissions for executing commands with elevated privileges on Unix-like systems. The rule specifically monitors events categorized as file changes within the sudoers file path, excluding modifications from legitimate package management processes and configuration management tools known to alter the file during standard operations. The detection logic is crafted using KQL (Kibana Query Language) to parse events from Elastic's Auditbeat and other relevant logs, ensuring that only suspicious alterations trigger an alert. The rule is rated with a medium risk score of 47 due to its importance in detecting potential privilege escalation attempts by adversaries. Analysts are advised to conduct thorough investigations by reviewing the nature of the alert, examining user behavior, and assessing system logs surrounding the detected changes to identify possible indicators of compromise (IoCs) or unauthorized access activities.
Categories
  • Endpoint
  • Linux
  • macOS
Data Sources
  • File
  • Logon Session
  • Process
ATT&CK Techniques
  • T1548
  • T1548.003
Created: 2020-04-13