-
Notifications
You must be signed in to change notification settings - Fork 526
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Rule] Root Certificate Installation #4025
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems like legitamite admin activity. Is there any other suspicious events we can key on?
Given that this activity should occur infrequently, I would benefit from receiving full telemetry at first. I can always exclude known patterns, or whitelist malicious patterns through process executables in a second iteration. I push it as low, given the potential benign label. @Mikaayenson |
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
* [New Rule] Root Certificate Installation * Update defense_evasion_root_certificate_installation.toml * Update rules/linux/defense_evasion_root_certificate_installation.toml (cherry picked from commit 9f964b6)
Summary
This rule detects the installation of root certificates on a Linux system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to their command and control servers. Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certificate is installed, the system or application will trust certificates in the root's chain of trust that have been signed by the root certificate.
Telemetry
3 hits in telemetry, only TPs in testing stack from e.g. a CVE installing a root certificate.