heroui logo

Linux Restricted Shell Breakout via c89/c99 Shell evasion

Elastic Detection Rules

View Source
Summary
This detection rule targets potential abuse of the `c89` and `c99` binaries in Linux environments. These binaries are standard C compilation interfaces, and their misuse to spawn interactive system shells indicates a potential security threat. The rule identifies the execution of a shell process (`sh`, `dash`, or `bash`) that has `c89` or `c99` as its parent process, especially when the parent is invoked with specific arguments. This behavior suggests that an attacker may be leveraging system utilities to escape restricted environments and gain enhanced capabilities. Given that this activity is not standard usage for these binaries by legitimate users or admins, it raises red flags for malicious activity. With a medium risk score assigned, the detection aims to catch unauthorized shell access attempts initiated through these compilation binaries before the situation escalates.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Process
  • Application Log
  • Container
ATT&CK Techniques
  • T1059
  • T1059.004
Created: 2022-03-15