heroui logo

Shell Execution via Flock - Linux

Sigma Rules

View Source
Summary
This detection rule identifies potential malicious activity associated with the use of the `flock` command in a Linux environment. The `flock` command is typically utilized for managing file locks, but its misuse can indicate attempts at privilege escalation or other unauthorized command executions. The rule focuses on process creation events where the command lines indicate that `flock` is used in combination with shell commands like `/bin/bash`, `/bin/sh`, etc. By analyzing the command line of processes and ensuring they include the `flock` image and specific shell commands, security teams can catch potentially harmful activity trying to exploit the locking mechanism. The rule is essential for monitoring environments that enforce restricted shell access, as it could be a vector for breaking out of such limitations.
Categories
  • Linux
Data Sources
  • Process
Created: 2024-09-02