
Summary
The rule 'Potential Linux Hack Tool Launched' is designed to monitor and detect the execution of processes that are commonly associated with malicious activities on Linux systems. It utilizes EQL (Event Query Language) to identify any processes initiated in a Linux environment that may be utilized by attackers. The focus is on several hacking tools and exploitation frameworks, such as 'crackmapexec', 'msfconsole', and 'sqlmap', which may indicate unauthorized use by threat actors. Given that many of these tools are also leveraged by system administrators and security professionals for legitimate purposes, any alerts generated by this rule require thorough investigation to ascertain the intent behind the process execution. The rule captures events from various data sources and employs an integrated Elastic Defend setup, necessitating the use of Fleet for data collection. Alert conditions focus on process start events connected to a predefined list of potentially harmful executables. The rule aims to create a balance between minimizing false positives and enhancing detection capabilities, suggesting specific investigative steps for analysts to follow upon triggering an alert.
Categories
- Endpoint
- Linux
- Cloud
- Other
Data Sources
- Process
- Container
- Script
- Application Log
- Network Traffic
Created: 2023-09-22