<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sudoers — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sudoers/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 27 Apr 2026 23:12:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sudoers/feed.xml" rel="self" type="application/rss+xml"/><item><title>Linux Persistence via Sudoers.d File Manipulation</title><link>https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</link><pubDate>Mon, 27 Apr 2026 23:12:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-sudoers-persistence/</guid><description>Attackers can achieve persistence and privilege escalation on Linux systems by creating or modifying files in the /etc/sudoers.d/ directory to grant unauthorized users or groups sudo privileges.</description><content:encoded>&lt;p>The sudoers.d directory on Linux systems is designed to allow administrators to manage sudo privileges by adding individual files rather than modifying the main /etc/sudoers file. An attacker who gains initial access to a system can exploit this by creating or modifying files within this directory to grant themselves or other malicious actors elevated privileges. This can be done to ensure persistent access, even if other initial access methods are detected and remediated. The modification of…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>linux</category><category>sudoers</category></item></channel></rss>