
Summary
This detection rule is focused on identifying potential malicious activities aimed at clearing or removing the syslog file in Linux environments. Syslog files are critical for logging system events, and their unauthorized deletion is a common tactic used by attackers to cover their tracks after exploiting a system. The detection is triggered by specific commands that are typically used for such operations, including variations of `rm` commands to remove the syslog file, as well as redirections (e.g., `> /var/log/syslog`) that may also indicate an attempt to clear the log without deleting the file. It incorporates a mechanism to filter out known false positives, such as legitimate log rotation processes that may also involve changes to syslog files. The implementation targets the Linux operating system specifically, contributing to a broader security strategy by providing alerts when unusual command executions related to syslog files are detected.
Categories
- Linux
- Endpoint
Data Sources
- Command
- Logon Session
Created: 2021-09-10