heroui logo

Suspicious Invocation of Shell via Rsync

Sigma Rules

View Source
Summary
This detection rule targets potential exploitation via the 'rsync' command in Linux environments, specifically when a shell is invoked without using the expected '-e' flag. The absence of this flag can indicate that the process is being misused to execute arbitrary commands, potentially as part of an attack leading to unauthorized access or privilege escalation. The rule references CVE-2024-12084, which is related to remote code execution vulnerabilities in 'rsync'. In practical terms, this means that whenever a process is launched as a child of 'rsync' (or 'rsyncd') and involves a shell (such as bash or sh), but does not include the '-e' flag in its command line, it will trigger an alert. The rule is designed to mitigate risks associated with this vulnerability by enabling security teams to monitor and respond to suspicious process activities effectively.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2025-01-18