
Summary
This detection rule identifies potential malicious activities related to the overwriting of the 'authorized_keys' file, which is critical in SSH (Secure Shell) authentication for Linux and macOS systems. The rule specifically targets actions performed within the last two hours on either Linux or macOS platforms, where users may be utilizing text editors (like vi, vim, or nano) or command-line operations that involve redirecting outputs that could lead to the unauthorized manipulation of the 'authorized_keys' file. This is indicative of account manipulation techniques, particularly in scenarios where threat actors, such as TeamTNT, may attempt to maintain persistence within the compromised systems. Malicious crafting of this file can allow attackers to establish unauthorized access to target systems, making this rule significant for detecting potential threats to system integrity and user account security.
Categories
- Linux
- macOS
Data Sources
- Process
ATT&CK Techniques
- T1098.004
Created: 2024-02-09