<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Integrity — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-integrity/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-integrity/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Modification of Sensitive Linux Files</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-file-modification/</guid><description>This threat brief covers the detection of suspicious processes modifying sensitive files on Linux systems, potentially indicating malicious attempts to persist, escalate privileges, or disrupt system operations.</description><content:encoded>&lt;p>Attackers often target sensitive and critical files on Linux systems to maintain persistence, escalate privileges, or disrupt system operations. These files include system configuration files, authentication files, and critical application files. Monitoring changes to these files is crucial for detecting malicious activity. This brief focuses on identifying suspicious process executions that could indicate unauthorized modification of sensitive files. The detection strategy covers processes…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>file-integrity</category><category>privilege-escalation</category><category>persistence</category><category>linux</category></item></channel></rss>