Group Has Been Deleted Via Groupdel
Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks
Sigma rule (View on GitHub)
1title: Group Has Been Deleted Via Groupdel
2id: 8a46f16c-8c4c-82d1-b121-0fdd3ba70a84
3status: test
4description: Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks
5references:
6 - https://linuxize.com/post/how-to-delete-group-in-linux/
7 - https://www.cyberciti.biz/faq/linux-remove-user-command/
8 - https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/
9 - https://linux.die.net/man/8/groupdel
10author: Tuan Le (NCSGroup)
11date: 2022-12-26
12tags:
13 - attack.impact
14 - attack.t1531
15logsource:
16 product: linux
17 category: process_creation
18detection:
19 selection:
20 Image|endswith: '/groupdel'
21 condition: selection
22falsepositives:
23 - Legitimate administrator activities
24level: medium
References
Related rules
- AWS ElastiCache Security Group Modified or Deleted
- Azure Kubernetes Service Account Modified or Deleted
- Google Cloud Service Account Disabled or Deleted
- Okta User Account Locked Out
- Remove Account From Domain Admin Group