<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auditd — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/auditd/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 09:51:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/auditd/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Root Effective Shell from Non-Standard Path via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</link><pubDate>Fri, 01 May 2026 09:51:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</guid><description>This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies potential privilege escalation attempts on Linux systems by monitoring for processes with a root effective user ID (EUID) but a non-root real user ID (RUID), combined with the use of the <code>-p</code> flag (commonly used to preserve privileges in shells like bash or dash) and execution from a non-standard path (outside of <code>/bin</code>, <code>/sbin</code>, <code>/usr/bin</code>, etc.).  Attackers may copy or link setuid-capable shells or similar helpers into writable locations to regain a root context after local exploitation. This behavior is often associated with post-exploitation activities where attackers attempt to maintain or regain elevated privileges.  The rule relies on Auditd data to provide visibility into process execution events and user context. The original rule was published on 2026-04-24 by Elastic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with limited privileges (e.g., through exploiting a vulnerability or using stolen credentials).</li>
<li>Attacker identifies a writable directory outside of standard system binary paths (e.g., <code>/tmp</code>, <code>/var/tmp</code>).</li>
<li>Attacker copies or creates a symbolic link to a setuid-capable shell (e.g., <code>/bin/bash</code>, <code>/bin/dash</code>) into the identified writable directory. This copied shell retains the setuid bit.</li>
<li>Attacker executes the copied or linked shell from the non-standard path with the <code>-p</code> flag (e.g., <code>/tmp/bash -p</code>). The <code>-p</code> flag instructs the shell to preserve privileges, effectively running with the effective user ID (EUID) of root.</li>
<li>Auditd logs this process execution event, capturing the non-standard path, the use of the <code>-p</code> flag, the root EUID, and the non-root RUID.</li>
<li>The detection rule identifies the process execution event based on the criteria outlined above.</li>
<li>Attacker now has a root shell and can perform administrative tasks, install malware, or further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over the compromised system. This allows them to access sensitive data, install malicious software, modify system configurations, and potentially pivot to other systems on the network. This can lead to data breaches, system downtime, and significant financial losses.  The risk score for this type of activity is considered high due to the potential for significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Root Effective Shell from Non-Standard Path via Auditd</code> to your SIEM and tune for your environment.</li>
<li>Ensure that Auditd Manager or Auditbeat is properly configured to collect process execution events with relevant fields (<code>event.action</code>, <code>user.id</code>, <code>user.effective.id</code>, <code>process.args</code>, and <code>process.executable</code>) as described in the rule setup to enable the rule to function correctly.</li>
<li>Investigate any alerts generated by this rule by inspecting <code>process.executable</code>, <code>process.args</code>, <code>process.parent</code>, and the full command line reconstructed in audit logs.</li>
<li>Regularly audit all setuid binaries on the filesystem to identify any unauthorized or malicious setuid executables.</li>
<li>Implement access controls and file integrity monitoring to prevent unauthorized modification of system binaries and writable directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>auditd</category></item><item><title>Curl or Wget Execution from Container Context</title><link>https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</guid><description>This rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of <code>curl</code> or <code>wget</code> being executed from within containers managed by <code>runc</code> on Linux systems. The rule leverages Auditd Manager to monitor system calls and flags processes running with the title <code>runc init</code> that then execute <code>curl</code> or <code>wget</code>. This activity is noteworthy because attackers often use these tools to download malicious payloads (stagers, scripts, implants) or to exfiltrate data after compromising a container. While these tools can be used legitimately within containers, their execution in the context of <code>runc init</code> suggests a higher risk of malicious activity. The rule focuses on narrowing the signal to the container runtime boundary where unexpected download clients are more worthy of review. The rule specifically leverages Auditd Manager for data collection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a host system, possibly through exploiting a vulnerability in an application running outside the container (e.g., web application).</li>
<li>The attacker identifies a containerized application running on the compromised host.</li>
<li>The attacker exploits a vulnerability within the container, or abuses a privileged workload within the container, to gain elevated privileges or code execution within the container.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to download additional tools or scripts into the container. These tools might include reverse shells, credential dumping tools, or data exfiltration utilities.</li>
<li>The attacker executes the downloaded tools to further compromise the container or the underlying host.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to stage data for exfiltration to an external server. This may involve compressing and encoding data before transmission.</li>
<li>The attacker initiates the data exfiltration process using <code>curl</code> or <code>wget</code> to send the staged data to a remote server controlled by the attacker.</li>
<li>The attacker achieves their final objective, which could include data theft, system disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised containers can lead to data breaches, service disruptions, and further attacks on internal systems. Successful exploitation could allow attackers to steal sensitive data, install malware, or pivot to other parts of the network, impacting confidentiality, integrity, and availability. The number of affected systems depends on the scope of the container deployment and the privileges granted to the compromised container.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Curl or Wget Execution from Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable Auditd Manager with syscall coverage including <code>execve</code> to capture process execution and arguments within containers, as mentioned in the rule&rsquo;s setup instructions.</li>
<li>Correlate alerts from this rule with network logs to identify the destination IP addresses and domains contacted by the compromised container.</li>
<li>Baseline trusted images and exclude stable image digests or namespaces when noisy to reduce false positives, as suggested in the rule&rsquo;s false positives section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>container</category><category>auditd</category><category>linux</category></item><item><title>Suspicious Process Accessing Sensitive Identity Files via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</guid><description>This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to sensitive identity files on Linux systems. It leverages Auditd to monitor file access events and flags processes that are commonly used for copying, scripting, or staging files from temporary directories. The targeted files include Kubernetes service account tokens, kubelet configurations, cloud CLI configurations for AWS, Azure, and Google Cloud, root SSH keys, and Docker configurations. These files are critical for authentication and authorization within the system, and unauthorized access could lead to credential theft, privilege escalation, or lateral movement. This is especially important in cloud environments and containerized deployments where these files are commonly used for managing access to resources. The rule is designed to exclude user home paths to avoid false positives and focus on system-level access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through various means, such as exploiting a vulnerability or compromising credentials.</li>
<li>The attacker uses a utility like <code>cp</code>, <code>cat</code>, or <code>curl</code> to access sensitive files such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> or <code>/root/.ssh/id_rsa</code>.</li>
<li>Auditd logs the file access event, capturing details about the process, user, and file path.</li>
<li>The detection rule identifies the suspicious process based on its name, executable path (e.g., <code>/tmp/*</code>), or command-line arguments.</li>
<li>The rule checks if the accessed file is in the list of sensitive identity files.</li>
<li>If both conditions are met, the rule triggers an alert, indicating potential unauthorized access to sensitive credentials.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to move laterally within the network.</li>
<li>The attacker uses the stolen credentials to access cloud resources or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and financial losses. The targeted files contain credentials for Kubernetes clusters, cloud environments (AWS, Azure, Google Cloud), and SSH keys, potentially impacting a wide range of resources. The impact is particularly severe in environments where these credentials are used for managing critical infrastructure or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration with the specified audit rules in the provided setup steps to monitor access to sensitive identity files on Linux systems. Ensure auditd is properly configured and running (<code>auditctl -l</code>) to generate the necessary logs.</li>
<li>Deploy the Sigma rules provided to detect suspicious processes accessing sensitive identity files and tune them for your environment by excluding legitimate processes or users as needed.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the process name, executable, parent command line, and the accessed file path to determine the legitimacy of the access.</li>
<li>Review and harden file permissions on shared credential stores to prevent unauthorized access. Rotate exposed keys and tokens and invalidate cloud sessions if a compromise is suspected, as suggested in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>linux</category><category>auditd</category></item></channel></rss>