heroui logo

Suspicious Package Installed - Linux

Sigma Rules

View Source
Summary
The rule detects the installation of potentially suspicious packages on Linux systems using various package management utilities. This includes monitoring common package management tools such as APT, YUM, RPM, and DPKG. The rule is triggered when the command line for these tools contains specific keywords associated with network tools (e.g., 'nmap', 'netcat', etc.), indicating a possible malicious intent to install these packages. The detection strategy is to identify any process using one of these package management commands combined with these suspicious keywords, which could suggest attempts to evade detection by installing additional networking tools. The rule accounts for false positives arising from legitimate administrative activities, making it important for analysts to further investigate alerts generated by this rule to confirm malicious activity.
Categories
  • Linux
Data Sources
  • Process
Created: 2023-01-03