
Summary
This detection rule monitors for potential attempts to disable AppArmor, which is a Linux security module that controls the access permissions of applications and processes. Adversaries often target security tools like AppArmor to evade detection of their malicious activities. The rule specifically looks for the execution of certain commands (e.g., `systemctl`, `service`, `chkconfig`, `ln`) with parameters that denote disabling or stopping AppArmor. The rule applies to several log sources including Elastic Defend, auditd, and Crowdstrike logs. A risk score of 21 indicates a relatively low but concerning potential threat, urging a careful investigation of the command execution and links to user accounts. The setup requires integration with Elastic Defend for effective monitoring, and the response should cover investigation of process logs and user authorizations.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Logon Session
- User Account
- Network Traffic
- Application Log
ATT&CK Techniques
- T1562
- T1562.001
Created: 2023-08-28