Closed mlakri closed 1 week ago
This is a rule that detects in the Auditd logs themselves the deletion of existing rules, which can be considered as a defense evasion attempt.
type=EXECVE msg=audit(1731504735.671:71132): argc=2 a0="auditctl" a1="-D"
This rule is already in #5079 so i'll handle both of them there.
Summary of the Pull Request
This is a rule that detects in the Auditd logs themselves the deletion of existing rules, which can be considered as a defense evasion attempt.
Changelog
Example Log Event
type=EXECVE msg=audit(1731504735.671:71132): argc=2 a0="auditctl" a1="-D"
Fixed Issues
SigmaHQ Rule Creation Conventions