heroui logo

Linux Video Recording or Screenshot Activity Detected

Elastic Detection Rules

View Source
Summary
This detection rule is designed to monitor for suspicious activity associated with common video recording and screenshot utilities on Linux systems. It identifies processes that invoke these utilities without the typical, commonly-used parent processes, suggesting potential misuse for adversarial purposes. Such activities may indicate attempts at espionage, credential theft, or reconnaissance by unauthorized users. The rule looks for process events characterized by actions such as 'exec' or 'start' with specific process names (like gnome-screenshot, spectacle, etc.), while filtering out benign usages that include help or version flags in their arguments. The rule operates in the Elastic ecosystem, querying multiple endpoint logs and provides a low-risk score due to the contextual nature of the behavior it monitors. With a historical lens of 9 months and a window for potential parent process analysis extending over the last 5 days, this rule aims to enhance endpoint security by capturing unexpected usage patterns that could signify nefarious intent.
Categories
  • Endpoint
Data Sources
  • Process
  • Application Log
  • User Account
ATT&CK Techniques
  • T1113
  • T1125
Created: 2026-01-07