
Summary
The 'Potential Sudo Hijacking' rule is established to detect suspicious activities surrounding the creation or renaming of the 'sudo' binary in a Linux environment, specifically at the locations '/usr/bin/sudo' or '/bin/sudo'. Attackers may attempt to replace the legitimate sudo binary with a malicious version to capture user passwords and escalate privileges or maintain persistence on the system. This detection is facilitated through EQL (Event Query Language), analyzing file events where the action was 'creation' or 'rename'. The rule focuses on filtering legitimate processes like package management operations (e.g., dpkg, yum, rpm) to reduce false positives. It requires data from Elastic Defend, a framework integrated into Elastic Agent. Overall, this rule plays a crucial role in identifying and mitigating potential threats related to privilege escalation and persistence tactics as defined by the MITRE ATT&CK framework.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- File
- Process
- User Account
ATT&CK Techniques
- T1548
- T1548.003
- T1574
Created: 2023-07-26