
Summary
The detection rule for 'Linux Auditd Preload Hijack Library Calls' focuses on identifying the exploitation of the LD_PRELOAD environment variable on Linux systems, which is a common technique used by attackers to hijack or hook library functions. This rule analyzes process execution logs from the Linux Audit daemon (Auditd) to detect command-line arguments indicating the use of LD_PRELOAD, which can facilitate privilege escalation and persistence. If this behavior is confirmed as malicious, it could enable adversaries to execute arbitrary code with elevated privileges. The implementation requires integrating and normalizing Auditd data within a Splunk environment, allowing for effective monitoring of Linux endpoints. Potential false positives may arise from legitimate administrative activities; thus, it is vital to curate filters meticulously to minimize such occurrences.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Script
- Logon Session
- Process
ATT&CK Techniques
- T1574.006
- T1574
Created: 2025-01-27