Skip to content

Commit 79d2458

Browse files
authored
Issue - 3901 (#3905)
* cosolidation of detections * updating test
1 parent b29ba95 commit 79d2458

File tree

3 files changed

+18
-7
lines changed

3 files changed

+18
-7
lines changed

detections/endpoint/linux_apt_get_privilege_escalation.yml renamed to detections/deprecated/linux_apt_get_privilege_escalation.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
name: Linux apt-get Privilege Escalation
22
id: d870ce3b-e796-402f-b2af-cab4da1223f2
3-
version: 10
4-
date: '2025-11-18'
3+
version: 11
4+
date: '2026-02-10'
55
author: Gowthamaraj Rajendran, Bhavin Patel, Splunk
6-
status: production
6+
status: deprecated
77
type: Anomaly
88
description: The following analytic detects the execution of the 'apt-get' command
99
with elevated privileges using 'sudo' on a Linux system. It leverages data from

detections/endpoint/linux_apt_privilege_escalation.yml

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
name: Linux APT Privilege Escalation
22
id: 4d5a05fa-77d9-4fd0-af9c-05704f9f9a88
3-
version: 9
4-
date: '2025-05-02'
5-
author: Gowthamaraj Rajendran, Splunk
3+
version: 10
4+
date: '2026-02-10'
5+
author: Gowthamaraj Rajendran, Bhavin Patel, Splunk
66
status: production
77
type: Anomaly
8-
description: The following analytic detects the use of the Advanced Package Tool (APT)
8+
description: The following analytic detects the use of the Advanced Package Tool (APT) or apt-get
99
with elevated privileges via sudo on Linux systems. It leverages Endpoint Detection
1010
and Response (EDR) telemetry to identify processes where APT commands are executed
1111
with sudo rights. This activity is significant because it indicates a user can run
@@ -15,6 +15,7 @@ description: The following analytic detects the use of the Advanced Package Tool
1515
security risk.
1616
data_source:
1717
- Sysmon for Linux EventID 1
18+
- Cisco Isovalent Process Exec
1819
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
1920
as lastTime from datamodel=Endpoint.Processes where Processes.process="*apt*" AND
2021
Processes.process="*APT::Update::Pre-Invoke::*" AND Processes.process="*sudo*" by
@@ -82,3 +83,8 @@ tests:
8283
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548/apt/sysmon_linux.log
8384
source: Syslog:Linux-Sysmon/Operational
8485
sourcetype: sysmon:linux
86+
- name: True Positive Test - Cisco Isovalent
87+
attack_data:
88+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548/apt_get/cisco_isovalent.log
89+
source: not_applicable
90+
sourcetype: cisco:isovalent:processExec

removed/deprecation_mapping.YML

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
detections:
2+
- content: Linux apt-get Privilege Escalation
3+
removed_in_version: 5.24.0
4+
reason: Detection has been deprecated in favor of a more broad and generic logic that aims to reduce overhead and increase coverage.
5+
replacement_content:
6+
- Linux APT Privilege Escalation
27
- content: HTTP Suspicious Tool User Agent
38
removed_in_version: 5.22.0
49
reason: Detection has been renamed for clarity

0 commit comments

Comments
 (0)