heroui logo

Potential Unauthorized Access via Wildcard Injection Detected

Elastic Detection Rules

View Source
Summary
This rule monitors for unauthorized usage of the `chown` and `chmod` commands, specifically looking for command-line flags indicating potential wildcard injection attacks on Linux systems. Wildcard injection vulnerabilities allow attackers to trick the system into executing unintended operations through wildcard characters like `*`, `?`, and `[]`. These commands are typically used for changing file ownership and permissions, which can be maliciously manipulated to escalate privileges or access sensitive data. The detection rule is structured to flag instances where these commands are executed with the recursive flag `-R` and wildcard references in their arguments, signifying a potential threat to the security of file permissions and user privileges within Linux environments. Users are advised to follow investigation protocols to confirm whether legitimate administrative actions or malicious attempts are taking place.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Logon Session
  • File
  • Command
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1068
  • T1003
  • T1003.008
Created: 2023-07-28