Skip to content
Threat Feed
medium advisory

Suspicious Modification of Sensitive Linux Files

This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.

Attackers often target sensitive and critical files on Linux systems to maintain persistence, escalate privileges, or disrupt system operations. These files include system configuration files, authentication files, and critical application files. Monitoring changes to these files is crucial for detecting malicious activity. This brief focuses on identifying suspicious process executions that could indicate unauthorized modification of sensitive files. The detection strategy covers processes…

Detection coverage 3

Potential Suspicious Change To Sensitive/Critical Files via Redirection

medium

Detects changes to sensitive and critical files using command-line utilities with output redirection.

sigma tactics: impact techniques: T1565.001 sources: process_creation, linux

Potential Suspicious Change To Sensitive/Critical Files via Text Editors

medium

Detects changes to sensitive and critical files using text editors like vi, vim, nano, or emacs.

sigma tactics: impact techniques: T1565.001 sources: process_creation, linux

Suspicious Sed Usage on mdadm.conf

low

Detects suspicious usage of sed to modify mdadm.conf, excluding legitimate mdadm updates.

sigma tactics: impact techniques: T1565.001 sources: process_creation, linux

Detection queries are kept inside the platform. Get full rules →