
Summary
This detection rule identifies suspicious Linux discovery commands that are often executed by attackers to gather information about the system's configuration and vulnerabilities. The focus is on commands common in tools like AutoSUID, LinEnum, and LinPeas. The rule utilizes Endpoint Detection and Response (EDR) data to track the execution frequency of various commands in short time intervals. A significant threshold is set where executing more than 40 distinct commands and over 3 unique process names within a 5-minute window indicates potential malicious behavior. Such activity commonly precedes privilege escalation or other attacks, making it crucial for cybersecurity monitoring.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Process
- Network Traffic
ATT&CK Techniques
- T1059
- T1059.004
Created: 2024-11-13