heroui logo

Linux Indicator Removal Service File Deletion

Splunk Security Content

View Source
Summary
The Linux Indicator Removal Service File Deletion detection rule identifies potentially malicious activities centered around the deletion of Linux service unit configuration files by unusual processes. It utilizes Endpoint Detection and Response (EDR) telemetry, specifically monitoring for the 'rm' command being executed on files with a '.service' extension, which could indicate that malware is attempting to disable critical services or security measures as a strategy for evading detection. This detection is crucial because such deletions can lead to service interruptions, compromise security tools, or ultimately result in a complete takeover of a Linux system. The rule is reinforced with a filtering mechanism to reduce false positives from legitimate administrative tasks, such as network admins updating software. Implementation involves integrating logs from EDR agents and mapping them to the appropriate Splunk data models, ensuring comprehensive coverage of process execution telemetry.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • Process
ATT&CK Techniques
  • T1070.004
  • T1070
Created: 2024-11-13