<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Splunk Add-on for Unix and Linux — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/splunk-add-on-for-unix-and-linux/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/splunk-add-on-for-unix-and-linux/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Auditd Daemon Abort Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-linux-auditd-daemon-abort/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linux-auditd-daemon-abort/</guid><description>Detection of abnormal Linux audit daemon (auditd) termination via DAEMON_ABORT events, indicating potential auditing subsystem failure due to resource exhaustion, corruption, or malicious interference.</description><content:encoded><![CDATA[<p>This detection identifies abnormal terminations of the Linux audit daemon (auditd) by monitoring for DAEMON_ABORT events within audit logs. Such terminations suggest a critical failure in the auditing subsystem, potentially stemming from resource exhaustion, data corruption, or malicious actions aimed at disrupting the logging process. Unlike a graceful shutdown, a DAEMON_ABORT event implies that audit logging may have been disabled unexpectedly, compromising system observability and security monitoring. Defenders should prioritize investigating these events, correlating them with DAEMON_START, DAEMON_END, and overall system logs to pinpoint the root cause. Recurring aborts or the absence of a subsequent DAEMON_START signal indicate a high-severity issue requiring immediate attention to ensure continued log integrity and security posture.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., through exploiting a vulnerability or using stolen credentials).</li>
<li>Attacker escalates privileges to a level where they can interact with system services.</li>
<li>Attacker attempts to corrupt auditd&rsquo;s configuration or data files, causing it to fail.</li>
<li>The auditd daemon encounters an unrecoverable error and generates a DAEMON_ABORT event in the audit logs.</li>
<li>The system administrator may not immediately notice the auditd failure, leaving a gap in security monitoring.</li>
<li>Attacker performs malicious activities without being properly logged by auditd.</li>
<li>Attacker attempts to remove evidence of the auditd failure from system logs.</li>
<li>The attacker achieves their objective, such as data theft or system compromise, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leading to auditd daemon aborts can severely compromise an organization&rsquo;s security monitoring capabilities. With audit logging disabled or unreliable, malicious activities can go undetected, leading to data breaches, system compromise, and other security incidents. The absence of reliable audit logs can also hinder incident response efforts and forensic investigations, making it difficult to determine the scope and impact of an attack. Organizations in regulated industries may also face compliance issues due to the lack of complete audit trails.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Linux auditd logging to capture DAEMON_ABORT events (see <code>data_source</code> in search definition).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect DAEMON_ABORT events and tune the rule based on your environment.</li>
<li>Investigate any detected DAEMON_ABORT events by correlating them with DAEMON_START, DAEMON_END, and system logs to determine the root cause.</li>
<li>Monitor the time between DAEMON_ABORT and DAEMON_START events to identify potential issues requiring further investigation.</li>
<li>Use Splunk Add-on for Unix and Linux (<a href="https://splunkbase.splunk.com/app/833">https://splunkbase.splunk.com/app/833</a>) to ensure proper parsing and categorization of auditd data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>auditd</category><category>linux</category><category>anomaly</category><category>endpoint</category></item><item><title>Linux Auditd Detects Firewall Modification or Disabling</title><link>https://feed.craftedsignal.io/briefs/2024-01-linux-firewall-modification/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-linux-firewall-modification/</guid><description>The analytic detects suspicious disabling or modification of the system firewall on Linux systems, which can indicate unauthorized access or attempts to maintain control over a system by disabling host protections.</description><content:encoded><![CDATA[<p>This detection identifies attempts to disable or modify system firewalls on Linux systems, a common tactic used by attackers to weaken defenses and maintain unauthorized access. The detection focuses on monitoring <code>auditd</code> logs for <code>SERVICE_STOP</code> events targeting <code>firewalld</code> and <code>ufw</code>, two popular Linux firewall management tools. Successful exploitation can lead to a compromised system, unauthorized access to sensitive data, or a wider breach affecting the entire network. The rule is based on research from Splunk and is intended to identify living-off-the-land techniques used for privilege escalation and persistence within a compromised Linux environment. The affected product is the Splunk platform using the Splunk Add-on for Unix and Linux.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Linux system (e.g., via compromised credentials or vulnerability exploitation).</li>
<li>Attacker attempts to disable the <code>firewalld</code> service using a command-line utility such as <code>systemctl stop firewalld</code>.</li>
<li>The <code>auditd</code> daemon logs the <code>SERVICE_STOP</code> event with <code>unit=firewalld</code>.</li>
<li>Alternatively, the attacker attempts to disable the <code>ufw</code> service using <code>ufw disable</code>.</li>
<li>The <code>auditd</code> daemon logs the <code>SERVICE_STOP</code> event with <code>unit=ufw</code>.</li>
<li>The attacker modifies firewall rules to allow unauthorized access, potentially using <code>iptables</code> or <code>nftables</code> directly.</li>
<li>These rule modifications further weaken the host defenses.</li>
<li>The attacker establishes persistence and maintains unauthorized access to the system, potentially escalating privileges and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising the system firewall allows attackers to bypass network segmentation and access other systems. A successful attack can result in complete system compromise, data theft, and further lateral movement within the network. Systems that are critical to business operations, such as database servers or application servers, could be severely impacted. This could lead to significant financial losses, reputational damage, and regulatory fines.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure <code>auditd</code> is properly configured and ingesting events related to service management on Linux endpoints.</li>
<li>Install and configure the Splunk Add-on for Unix and Linux to properly parse <code>auditd</code> logs as described in the &ldquo;How to Implement&rdquo; section.</li>
<li>Deploy the Sigma rule &ldquo;Linux Auditd Disable Or Modify System Firewall&rdquo; to your SIEM and tune based on the filter macros for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the service stop events.</li>
<li>Review and harden Linux firewall configurations across the environment to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>privilege-escalation</category><category>firewall</category></item><item><title>Linux Auditd Daemon (Re)Initialization Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-linux-auditd-daemon-start/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-linux-auditd-daemon-start/</guid><description>Detection of Linux audit daemon (auditd) re-initialization events, which can indicate attempts to re-enable audit logging after evasion or restarts with modified rule sets.</description><content:encoded><![CDATA[<p>This analytic detects the (re)initialization of the Linux audit daemon (auditd) by identifying log entries of type <code>DAEMON_START</code>. This event indicates that the audit subsystem has resumed logging after being stopped or has started during system boot. While <code>DAEMON_START</code> may be expected during reboots or legitimate configuration changes, it can also signal attempts to re-enable audit logging after evasion, or restarts with modified or reduced rule sets. Monitoring this event in correlation with <code>DAEMON_END</code>, <code>DAEMON_ABORT</code>, and <code>auditctl</code> activity provides visibility into the continuity and integrity of audit logs. Frequent or unexplained <code>DAEMON_START</code> events should be investigated, especially if they are not accompanied by valid administrative or system activity. This detection is relevant for environments utilizing auditd for security monitoring and compliance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system.</li>
<li>The attacker identifies that auditd is enabled and logging events.</li>
<li>The attacker attempts to disable auditd to evade detection, possibly using <code>auditctl -s disable</code> or similar commands.</li>
<li>After performing malicious actions, the attacker may attempt to re-enable auditd, potentially with a modified configuration to avoid logging their activities, triggering a <code>DAEMON_START</code> event.</li>
<li>The attacker modifies the audit rules to exclude specific users, processes, or file paths from being logged.</li>
<li>The attacker restarts the auditd service using <code>systemctl restart auditd</code> or a similar command, generating a <code>DAEMON_START</code> event.</li>
<li>The system resumes logging with the modified audit rules, potentially missing critical security events.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a compromised Linux host where malicious activities are not properly logged, hindering incident response and forensic investigations. Attackers could manipulate audit logs by stopping and restarting the service with altered configurations, reducing the effectiveness of security monitoring. The impact includes a loss of visibility into attacker actions, potentially leading to prolonged compromise and data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Linux Auditd Daemon Start</code> to your SIEM and tune for your environment to detect unexpected auditd restarts.</li>
<li>Correlate <code>DAEMON_START</code> events with <code>DAEMON_END</code> and <code>DAEMON_ABORT</code> events to identify anomalies in auditd service management.</li>
<li>Monitor <code>auditctl</code> activity for unauthorized modifications to audit rules.</li>
<li>Investigate frequent or unexplained <code>DAEMON_START</code> events, especially those not accompanied by valid administrative or system activity, as highlighted in the overview.</li>
<li>Ensure proper ingestion and normalization of auditd logs using the Splunk Add-on for Unix and Linux, as mentioned in the &ldquo;How to Implement&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>linux</category><category>auditd</category><category>anomaly</category></item></channel></rss>