<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Elastic Agent Auditd Manager — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/elastic-agent-auditd-manager/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/elastic-agent-auditd-manager/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Process Accessing Sensitive Identity Files via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</guid><description>This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to sensitive identity files on Linux systems. It leverages Auditd to monitor file access events and flags processes that are commonly used for copying, scripting, or staging files from temporary directories. The targeted files include Kubernetes service account tokens, kubelet configurations, cloud CLI configurations for AWS, Azure, and Google Cloud, root SSH keys, and Docker configurations. These files are critical for authentication and authorization within the system, and unauthorized access could lead to credential theft, privilege escalation, or lateral movement. This is especially important in cloud environments and containerized deployments where these files are commonly used for managing access to resources. The rule is designed to exclude user home paths to avoid false positives and focus on system-level access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through various means, such as exploiting a vulnerability or compromising credentials.</li>
<li>The attacker uses a utility like <code>cp</code>, <code>cat</code>, or <code>curl</code> to access sensitive files such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> or <code>/root/.ssh/id_rsa</code>.</li>
<li>Auditd logs the file access event, capturing details about the process, user, and file path.</li>
<li>The detection rule identifies the suspicious process based on its name, executable path (e.g., <code>/tmp/*</code>), or command-line arguments.</li>
<li>The rule checks if the accessed file is in the list of sensitive identity files.</li>
<li>If both conditions are met, the rule triggers an alert, indicating potential unauthorized access to sensitive credentials.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to move laterally within the network.</li>
<li>The attacker uses the stolen credentials to access cloud resources or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and financial losses. The targeted files contain credentials for Kubernetes clusters, cloud environments (AWS, Azure, Google Cloud), and SSH keys, potentially impacting a wide range of resources. The impact is particularly severe in environments where these credentials are used for managing critical infrastructure or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration with the specified audit rules in the provided setup steps to monitor access to sensitive identity files on Linux systems. Ensure auditd is properly configured and running (<code>auditctl -l</code>) to generate the necessary logs.</li>
<li>Deploy the Sigma rules provided to detect suspicious processes accessing sensitive identity files and tune them for your environment by excluding legitimate processes or users as needed.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the process name, executable, parent command line, and the accessed file path to determine the legitimacy of the access.</li>
<li>Review and harden file permissions on shared credential stores to prevent unauthorized access. Rotate exposed keys and tokens and invalidate cloud sessions if a compromise is suspected, as suggested in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>linux</category><category>auditd</category></item></channel></rss>