<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>attack.t1685.006 on Detection.FYI</title>
    <link>https://detection.fyi/tags/attack.t1685.006/</link>
    <description>Recent content in attack.t1685.006 on Detection.FYI</description>
    <generator>Hugo -- gohugo.io</generator>
    <copyright> </copyright>
    <lastBuildDate>Tue, 28 Apr 2026 23:20:23 +0000</lastBuildDate><atom:link href="https://detection.fyi/tags/attack.t1685.006/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Clear or Disable Kernel Ring Buffer Logs via Syslog Syscall</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_clean_disable_dmesg_logs_via_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_clean_disable_dmesg_logs_via_syslog/</guid>
      <description>
        
          
            Detects the use of the `syslog` syscall with action code 5 (SYSLOG_ACTION_CLEAR),
(4 is SYSLOG_ACTION_READ_CLEAR and 6 is SYSLOG_ACTION_CONSOLE_OFF) which clears the kernel
ring buffer (dmesg logs). This can be used by attackers to hide traces after exploitation
or privilege escalation. A common technique is running `dmesg -c`, which triggers this syscall internally.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Indicator Removal on Host - Clear Mac System Logs</title>
      <link>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_clear_system_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_clear_system_logs/</guid>
      <description>
        
          
            Detects deletion of local audit logs
          
          
        
      </description>
    </item>
    
    <item>
      <title>Linux Logs Clearing Attempts</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_logs/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_logs/</guid>
      <description>
        
          
            Detects logs clearing attempts on Linux systems via utilities such as &#39;rm&#39;, &#39;rmdir&#39;, &#39;shred&#39;, and &#39;unlink&#39; targeting log files and directories.
Adversaries often try to clear logs to cover their tracks after performing malicious activities.

          
          
        
      </description>
    </item>
    
    <item>
      <title>Syslog Clearing or Removal Via System Utilities</title>
      <link>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_syslog/</link>
      <pubDate>Tue, 28 Apr 2026 23:20:23 +0000</pubDate>
      
      <guid>https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_clear_syslog/</guid>
      <description>
        
          
            Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

          
          
        
      </description>
    </item>
    
  </channel>
</rss>
