8000 clear journalctl logs by CheraghiMilad · Pull Request #5439 · SigmaHQ/sigma · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

clear journalctl logs #5439

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 9 commits into
base: master
Choose a base branch
from

Conversation

CheraghiMilad
Copy link
Contributor

Summary of the Pull Request

Detects attempts to rotate or delete system logs using journalctl
with options like --rotate, --vacuum-time. These actions can be abused by attackers
to erase forensic evidence after gaining elevated access.
This rule focuses on EXECVE events that capture command-line arguments.

Changelog

{
  "type": "EXECVE",
  "msg": "audit(1748369794.317:3537)",
  "argc": 3,
  "a0": "sudo",
  "a1": "journalctl",
  "a2": "--vacuum-time=1s"
}
{
  "type": "EXECVE",
  "msg": "audit(1748369794.317:3537)",
  "argc": 3,
  "a0": "sudo",
  "a1": "journalctl",
  "a2": "--rotate"
}

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Linux Pull request add/update linux related rules labels May 27, 2025
CheraghiMilad and others added 4 commits May 28, 2025 16:38
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
CheraghiMilad and others added 3 commits May 31, 2025 20:44
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
@CheraghiMilad CheraghiMilad requested a review from phantinuss June 2, 2025 18:06
service: auditd
detection:
selection_root:
type: 'EXECVE'
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As also mentioned in PR 5460, it is better to use a generic Linux process creation format rather than the auditd-type EXECVE format, since most modern SIEM systems collect logs using the command-line format instead of the a0, a1 argument-style used by auditd.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Linux Pull request add/update linux related rules Rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0