heroui logo

Linux At Allow Config File Creation

Splunk Security Content

View Source
Summary
The rule titled 'Linux At Allow Config File Creation' detects the creation of the configuration files '/etc/at.allow' and '/etc/at.deny' on Linux systems. These files are integral to controlling user permissions for the 'at' scheduling application, and their modification can be indicative of an attacker attempting to establish persistence on the system. The rule leverages file creation events captured by the Endpoint data model and specifically looks for any creation events associated with these files. If such events are detected, analysts are encouraged to review the creation time, file path, and any processes associated with the file creation in order to determine the legitimacy of the action. Malicious creation of these files may facilitate unauthorized code execution, which could lead to serious compromises such as data exfiltration or further system breaches. To effectively implement this rule, appropriate logging must be enabled to capture relevant file and process details, and the filtering should be adjusted to reduce false positives, particularly those resulting from legitimate administrative actions.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • File
  • Process
ATT&CK Techniques
  • T1053.003
  • T1053
  • T1053.002
Created: 2024-11-13