Linux Auditd Daemon (Re)Initialization Detection
Detection of Linux audit daemon (auditd) re-initialization events, which can indicate attempts to re-enable audit logging after evasion or restarts with modified rule sets.
This analytic detects the (re)initialization of the Linux audit daemon (auditd) by identifying log entries of type DAEMON_START. This event indicates that the audit subsystem has resumed logging after being stopped or has started during system boot. While DAEMON_START may be expected during reboots or legitimate configuration changes, it can also signal attempts to re-enable audit logging after evasion, or restarts with modified or reduced rule sets. Monitoring this event in correlation with DAEMON_END, DAEMON_ABORT, and auditctl activity provides visibility into the continuity and integrity of audit logs. Frequent or unexplained DAEMON_START events should be investigated, especially if they are not accompanied by valid administrative or system activity. This detection is relevant for environments utilizing auditd for security monitoring and compliance.
Attack Chain
- An attacker gains initial access to a Linux system.
- The attacker identifies that auditd is enabled and logging events.
- The attacker attempts to disable auditd to evade detection, possibly using
auditctl -s disableor similar commands. - After performing malicious actions, the attacker may attempt to re-enable auditd, potentially with a modified configuration to avoid logging their activities, triggering a
DAEMON_STARTevent. - The attacker modifies the audit rules to exclude specific users, processes, or file paths from being logged.
- The attacker restarts the auditd service using
systemctl restart auditdor a similar command, generating aDAEMON_STARTevent. - The system resumes logging with the modified audit rules, potentially missing critical security events.
Impact
A successful attack can lead to a compromised Linux host where malicious activities are not properly logged, hindering incident response and forensic investigations. Attackers could manipulate audit logs by stopping and restarting the service with altered configurations, reducing the effectiveness of security monitoring. The impact includes a loss of visibility into attacker actions, potentially leading to prolonged compromise and data breaches.
Recommendation
- Deploy the Sigma rule
Linux Auditd Daemon Startto your SIEM and tune for your environment to detect unexpected auditd restarts. - Correlate
DAEMON_STARTevents withDAEMON_ENDandDAEMON_ABORTevents to identify anomalies in auditd service management. - Monitor
auditctlactivity for unauthorized modifications to audit rules. - Investigate frequent or unexplained
DAEMON_STARTevents, especially those not accompanied by valid administrative or system activity, as highlighted in the overview. - Ensure proper ingestion and normalization of auditd logs using the Splunk Add-on for Unix and Linux, as mentioned in the “How to Implement” section.
Detection coverage 3
Linux Auditd Daemon Start
mediumDetects the start of the Linux audit daemon (auditd) by identifying DAEMON_START events.
Detect Auditd Configuration Changes
mediumDetects changes to the auditd configuration file.
Detect Auditctl Rule Modifications
mediumDetects usage of auditctl to modify audit rules.
Detection queries are kept inside the platform. Get full rules →