You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rules/cross-platform/persistence_credential_access_modify_auth_module_or_config.toml
+3-4Lines changed: 3 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
creation_date = "2020/12/21"
3
3
integration = ["endpoint"]
4
4
maturity = "production"
5
-
updated_date = "2025/01/15"
5
+
updated_date = "2025/12/08"
6
6
7
7
[rule]
8
8
author = ["Elastic"]
@@ -17,7 +17,7 @@ from = "now-9m"
17
17
index = ["auditbeat-*", "logs-endpoint.events.*"]
18
18
language = "kuery"
19
19
license = "Elastic License v2"
20
-
name = "Modification of Standard Authentication Module or Configuration"
20
+
name = "Deprecated - Modification of Standard Authentication Module or Configuration"
21
21
references = [
22
22
"https://github.com/zephrax/linux-pam-backdoor",
23
23
"https://github.com/eurialo/pambd",
@@ -39,7 +39,6 @@ tags = [
39
39
]
40
40
timestamp_override = "event.ingested"
41
41
type = "new_terms"
42
-
43
42
query = '''
44
43
event.category:file and event.type:change and
45
44
(file.name:pam_*.so or file.path:(/etc/pam.d/* or /private/etc/pam.d/* or /usr/lib64/security/*)) and
@@ -74,7 +73,7 @@ note = """## Triage and analysis
74
73
> **Disclaimer**:
75
74
> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
76
75
77
-
### Investigating Modification of Standard Authentication Module or Configuration
76
+
### Investigating Deprecated - Modification of Standard Authentication Module or Configuration
78
77
79
78
Authentication modules, such as PAM (Pluggable Authentication Modules), are crucial for managing user authentication in Linux and macOS environments. Adversaries may exploit these by altering module files or configurations to gain unauthorized access or escalate privileges. The detection rule identifies suspicious changes to these modules, excluding legitimate processes and paths, to flag potential unauthorized modifications.
0 commit comments