
Summary
The rule "Potential Pspy Process Monitoring Detected" is designed to utilize the Linux Audit daemon (auditd) for detecting suspicious activities related to unauthorized process monitoring. Specifically, it focuses on detecting the use of the pspy tool, which can monitor Linux processes without requiring root privileges while scanning the /proc directory via the openat syscall. Such monitoring is a tactic used by attackers to uncover privilege escalation opportunities within a system. The rule collects data from the Auditd Manager which processes real-time audit events. The detection logic is implemented through an EQL sequence query that identifies specific syscall patterns and excludes benign processes known to typically perform similar actions. The setup of this rule necessitates an integration with the Auditd Manager, which is critical for capturing required events, ensuring the integrity and security of the detection capabilities.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- Container
- User Account
- Process
ATT&CK Techniques
- T1057
- T1082
Created: 2023-07-20