heroui logo

Linux Composer Privilege Escalation

Splunk Security Content

View Source
Summary
The Linux Composer Privilege Escalation detection rule targets the execution of the Composer tool with escalated privileges on Linux systems. By monitoring for the use of the 'sudo' command when running Composer, the rule seeks to identify potentially malicious attempts to gain root access through privilege escalation. Attackers executing Composer with elevated privileges could manipulate the system extensively, affecting both system integrity and data security. This detection is implemented using process execution logs captured by Endpoint Detection and Response (EDR) agents, which log relevant events and command-line arguments related to process creation. False positives may arise from legitimate usage scenarios, thus requiring additional filtering.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Command
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2024-11-13