Skip to content

[New Rule] Linux User Account Credential Modification #4484

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Feb 27, 2025

Conversation

Aegrah
Copy link
Contributor

@Aegrah Aegrah commented Feb 21, 2025

Summary

This rule detects Linux user account credential modification events where the echo command is used to directly echo a password into the passwd utility. This technique is used by malware to automate the process of user account credential modification on Linux systems post-infection.

Telemetry

This activity is seen performed by the DOTA3 malware:

image

@tradebot-elastic
Copy link

tradebot-elastic commented Feb 21, 2025

⛔️ Tests failed:

…toml

Co-authored-by: Jonhnathan <26856693+w0rk3r@users.noreply.github.com>
@tradebot-elastic
Copy link

tradebot-elastic commented Feb 27, 2025

⛔️ Tests failed:

@tradebot-elastic
Copy link

tradebot-elastic commented Feb 27, 2025

⛔️ Tests failed:

@Aegrah Aegrah merged commit fe48309 into main Feb 27, 2025
10 checks passed
@Aegrah Aegrah deleted the user-password-change-via-pipe branch February 27, 2025 15:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants