heroui logo

Linux Sudo Chroot Execution

Sigma Rules

View Source
Summary
The detection rule focuses on identifying the execution of the 'sudo' command with the '--chroot' option on Linux systems. This command allows users to change the root filesystem that their commands will see, potentially enabling attacks where malicious users can execute commands in a contained environment that may lack conventional monitoring. Attackers can exploit this feature as part of privilege escalation strategies—using it to run commands with elevated privileges that may bypass typical security measures. An example of such an attack vector is detailed in CVE-2025-32463. When monitoring for this activity, analysts should be wary of unconventional instances of 'sudo --chroot', especially when these commands are triggered from temporary directories or executed by atypical user accounts. The rule is designed to capture instances of particular process creation that meet these criteria.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2025-10-02