File tree Expand file tree Collapse file tree 3 files changed +18
-7
lines changed
Expand file tree Collapse file tree 3 files changed +18
-7
lines changed Original file line number Diff line number Diff line change 11name : Linux apt-get Privilege Escalation
22id : d870ce3b-e796-402f-b2af-cab4da1223f2
3- version : 10
4- date : ' 2025-11-18 '
3+ version : 11
4+ date : ' 2026-02-10 '
55author : Gowthamaraj Rajendran, Bhavin Patel, Splunk
6- status : production
6+ status : deprecated
77type : Anomaly
88description : The following analytic detects the execution of the 'apt-get' command
99 with elevated privileges using 'sudo' on a Linux system. It leverages data from
Original file line number Diff line number Diff line change 11name : Linux APT Privilege Escalation
22id : 4d5a05fa-77d9-4fd0-af9c-05704f9f9a88
3- version : 9
4- date : ' 2025-05-02 '
5- author : Gowthamaraj Rajendran, Splunk
3+ version : 10
4+ date : ' 2026-02-10 '
5+ author : Gowthamaraj Rajendran, Bhavin Patel, Splunk
66status : production
77type : Anomaly
8- description : The following analytic detects the use of the Advanced Package Tool (APT)
8+ description : The following analytic detects the use of the Advanced Package Tool (APT) or apt-get
99 with elevated privileges via sudo on Linux systems. It leverages Endpoint Detection
1010 and Response (EDR) telemetry to identify processes where APT commands are executed
1111 with sudo rights. This activity is significant because it indicates a user can run
@@ -15,6 +15,7 @@ description: The following analytic detects the use of the Advanced Package Tool
1515 security risk.
1616data_source :
1717- Sysmon for Linux EventID 1
18+ - Cisco Isovalent Process Exec
1819search : ' | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
1920 as lastTime from datamodel=Endpoint.Processes where Processes.process="*apt*" AND
2021 Processes.process="*APT::Update::Pre-Invoke::*" AND Processes.process="*sudo*" by
8283 - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548/apt/sysmon_linux.log
8384 source : Syslog:Linux-Sysmon/Operational
8485 sourcetype : sysmon:linux
86+ - name : True Positive Test - Cisco Isovalent
87+ attack_data :
88+ - data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548/apt_get/cisco_isovalent.log
89+ source : not_applicable
90+ sourcetype : cisco:isovalent:processExec
Original file line number Diff line number Diff line change 11detections :
2+ - content : Linux apt-get Privilege Escalation
3+ removed_in_version : 5.24.0
4+ reason : Detection has been deprecated in favor of a more broad and generic logic that aims to reduce overhead and increase coverage.
5+ replacement_content :
6+ - Linux APT Privilege Escalation
27 - content : HTTP Suspicious Tool User Agent
38 removed_in_version : 5.22.0
49 reason : Detection has been renamed for clarity
You can’t perform that action at this time.
0 commit comments