heroui logo

Steganography Extract Files with Steghide

Sigma Rules

View Source
Summary
This detection rule is designed to identify the usage of the 'steghide' binary specifically for extracting files that may be embedded within image files, such as JPEG or PNG formats. Steganography is a method employed by adversaries to hide confidential information within innocuous files, thereby evading detection by traditional security mechanisms. The rule tracks execution events generated by 'steghide' using the EXECVE syscall, analyzing parameters that indicate a file extraction operation with the specific command-line options that are characteristic of this activity. The presence of the parameters '-sf' along with file extensions corresponding to image types triggers the rule, indicating a potential attempt to extract hidden information. This rule leverages 'auditd' logs from Linux to detect such activity and raise alerts whenever steganography extraction attempts are made.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2021-09-11