
Summary
This detection rule is designed to identify potential data exfiltration attempts utilizing the Unix-based wget utility. The core concept revolves around the misuse of wget, often in conjunction with misconfigured sudo permissions, which could allow unauthorized users to perform actions typically restricted to higher privilege levels. Specifically, the detection is triggered when the EXECVE system call is invoked using wget with a command-line argument that starts with `--post-file=`, indicating an attempt to send a file over HTTP or HTTPS. A successful detection could indicate malicious intent, as an adversary may intend to exfiltrate sensitive data, such as /etc/shadow, a file that contains password hashes for all users. This rule is crucial given that the correct permissions for wget are not always properly enforced, leading to security vulnerabilities if abused. The false positive identified here is legitimate use of wget for posting files, which occurs regularly in many Linux environments, necessitating careful monitoring and contextual awareness when analyzing logs.
Categories
- Linux
- Endpoint
Data Sources
- Process
- File
- Command
Created: 2021-11-18