heroui logo

Equation Group Indicators

Sigma Rules

View Source
Summary
This detection rule is designed to identify suspicious shell command executions that are typically associated with the operations of the Equation Group, a notorious cyber espionage group. The rule focuses on specific keywords that are indicative of potentially malicious activities. These keywords include a range of commands typically used to manipulate file permissions, create unauthorized network connections, and run scripts that are often linked to backdoor operations. When one or more of these keywords appear in the command history or execution logs of a Linux system, it indicates that the system may have been compromised, or at least subjected to scrutiny by individuals using the techniques attributed to the Equation Group. Given the high level of sophistication employed by advanced persistent threat (APT) groups like Equation Group, this rule aims to preemptively catch such behavior before it can lead to more serious incursions. Therefore, security teams should closely monitor any alerts generated by this rule and investigate further to determine if there has been an actual breach.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Process
Created: 2017-04-09