heroui logo

Linux Visudo Utility Execution

Splunk Security Content

View Source
Summary
The Linux Visudo Utility Execution analytical rule detects instances where the 'visudo' command is executed on a Linux system. This utility is primarily used to safely edit the /etc/sudoers file, which controls user permissions and privileges on the system. The rule monitors process execution logs collected through Endpoint Detection and Response (EDR) agents, particularly focusing on instances where the command 'visudo' is invoked. Unauthorized execution of this command could allow adversaries to modify the sudoers file, leading to escalated privileges and potential full system compromise. The detection logic uses queries against the Endpoint data model in Splunk, examining key fields like process name, destination, user, parent process, and more to identify such events. Field normalization via the Splunk Common Information Model (CIM) ensures that the search criteria align with standard definitions, thereby optimizing the search performance and accuracy. Environments can prepare for this detection setup by ensuring relevant logs are ingested and appropriately mapped, while also adjusting for common false positives that may arise from legitimate administrative activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13