heroui logo

Proxy Shell Execution via Busybox

Elastic Detection Rules

View Source
Summary
The detection rule titled "Proxy Shell Execution via Busybox" identifies the execution of a shell through Busybox, a common lightweight binary used in many systems. Attackers may exploit Busybox to launch interactive shells as part of an evasion tactic to avoid detection by security solutions. This rule aims to recognize instances where processes are spawned from Busybox and contain specific command-line patterns associated with Unix shells like bash, dash, and others. The detection leverages process event data from Linux systems to trigger on suspicious activities that might indicate proxy execution attempts when the parent process is Busybox. The rule highlights potential investigation steps including correlation of events to user sessions, validation of Busybox's file integrity, and detection of abnormal process behavior. It also provides guidance on response measures such as isolating affected hosts, removing unauthorized Busybox instances, and resetting credentials to mitigate risks associated with such shell executions.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Container
ATT&CK Techniques
  • T1218
  • T1059
  • T1059.004
Created: 2025-11-20