heroui logo

Linux Audio Recording Activity Detected

Elastic Detection Rules

View Source
Summary
The rule 'Linux Audio Recording Activity Detected' is designed to monitor for unauthorized usage of common audio recording utilities in Unix-like operating systems, specifically by processes that have uncommon parent processes. This detection is aimed at identifying potential malicious activities such as espionage, credential theft, or reconnaissance, where adversaries might collect audio data from users or systems. The rule leverages a KQL query that filters for processes starting events within Linux environments. It checks for execution of certain audio recording utilities like 'arecord', 'parec', 'pw-record', and 'ecasound', along with conditions that exclude common help arguments to ensure it captures only significant actions. The rule has a low severity and evaluates data from various indices including endpoint process logs and SentinelOne event logs, suitable for ongoing threat detection efforts. The rule is linked to the MITRE ATT&CK framework focusing on the 'Audio Capture' technique (T1123), underlining its relevance to cybersecurity operations.
Categories
  • Endpoint
  • Linux
  • Infrastructure
Data Sources
  • Process
  • Container
  • Sensor Health
ATT&CK Techniques
  • T1123
Created: 2026-01-07