
Summary
The "Linux Auditd Find Private Keys" analytic serves to monitor and detect suspicious attempts to access private keys on Linux systems, which may indicate an attacker's efforts to retrieve sensitive cryptographic information. This detection rule is centered on the auditd data for Linux, utilizing the Execve events to track command-line executions of potentially malicious commands like 'find' or 'grep' that are used to search for files with extensions associated with private keys (.pem, .cer, .crt, etc.). The analytic aggregates results by counting occurrences of such attempts and recording the first and last times they were observed. The data ingestion and processing utilize methods from the Splunk Add-on for Unix and Linux, ensuring normalized field names for better cross-source compatibility and modeling. However, this analytic has been marked as deprecated, suggesting users should transition to updated detection methods. It should also be noted that false positives may arise from legitimate activities, especially automation by administrators or network operators, thus requiring careful tuning of the detection parameters.
Categories
- Linux
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Process
ATT&CK Techniques
- T1552.004
- T1552
Created: 2025-01-24