Local Groups Discovery - Linux
Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
Sigma rule (View on GitHub)
1title: Local Groups Discovery - Linux
2id: 676381a6-15ca-4d73-a9c8-6a22e970b90d
3status: test
4description: Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
7author: Ömer Günal, Alejandro Ortuno, oscd.community
8date: 2020-10-11
9modified: 2025-06-04
10tags:
11 - attack.discovery
12 - attack.t1069.001
13logsource:
14 category: process_creation
15 product: linux
16detection:
17 selection_1:
18 Image|endswith: '/groups'
19 selection_2:
20 Image|endswith:
21 - '/cat'
22 - '/ed'
23 - '/head'
24 - '/less'
25 - '/more'
26 - '/nano'
27 - '/tail'
28 - '/vi'
29 - '/vim'
30 CommandLine|contains: '/etc/group'
31 condition: 1 of selection_*
32falsepositives:
33 - Legitimate administration activities
34level: low
References
Related rules
- Permission Check Via Accesschk.EXE
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution