Persistence Via Sudoers Files
Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.
Sigma rule (View on GitHub)
1title: Persistence Via Sudoers Files
2id: ddb26b76-4447-4807-871f-1b035b2bfa5d
3status: test
4description: Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.
5references:
6 - https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/apps/deployer.sh
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-07-05
9modified: 2022-12-31
10tags:
11 - attack.privilege-escalation
12 - attack.execution
13 - attack.persistence
14 - attack.t1053.003
15logsource:
16 product: linux
17 category: file_event
18detection:
19 selection:
20 TargetFilename|startswith: '/etc/sudoers.d/'
21 condition: selection
22falsepositives:
23 - Creation of legitimate files in sudoers.d folder part of administrator work
24level: medium
References
Related rules
- Modifying Crontab
- Persistence Via Cron Files
- Triple Cross eBPF Rootkit Default Persistence
- Azure Kubernetes CronJob
- Scheduled Cron Task/Job - Linux