Home

Leverage Azure Security Center to detect when compromised Linux machines attack

%3CLINGO-SUB%20id%3D%22lingo-sub-283768%22%20slang%3D%22en-US%22%3ELeverage%20Azure%20Security%20Center%20to%20detect%20when%20compromised%20Linux%20machines%20attack%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-283768%22%20slang%3D%22en-US%22%3E%3CP%3EWhen%20an%20attacker%20compromises%20a%20machine%2C%20they%20typically%20have%20a%20goal%20in%20mind.%20Some%20attackers%20are%20looking%20for%20information%20residing%20on%20the%20victim%E2%80%99s%20machine%20or%20are%20looking%20for%20access%20to%20other%20machines%20on%20the%20victim%E2%80%99s%20network.%20Other%20times%2C%20attackers%20have%20plans%20to%20use%20the%20processing%20power%20of%20the%20machine%20itself%20or%20even%20use%20the%20machine%20as%20a%20launch%20point%20for%20other%20attacks.%20While%20on%20Linux%20virtual%20machines%20(VM)%20in%20Microsoft%20Azure%20we%20most%20commonly%20see%20attackers%20installing%20and%20running%20cryptocurrency%20mining%20software.%20This%20blog%20post%20will%20focus%20on%20the%20latter%20when%20an%20attacker%20wants%20to%20use%20the%20compromised%20machine%20as%20a%20launch%20point%20for%20other%20attacks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fsecurity-center%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E(ASC)%20utilizes%20an%20agent%20that%20runs%20on%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FMicrosoft%2FOMS-Agent-for-Linux%23supported-linux-operating-systems%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Emultiple%20distributions%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Eof%20Linux.%20When%20auditd%20is%20enabled%2C%20it%20collects%20logs%20including%20process%20creation%20events.%20These%20are%20run%20through%20the%20detection%20pipeline%20to%20look%20for%20malicious%20and%20suspicious%20activity.%20Alerts%20are%20surfaced%20through%20the%20ASC%20portal.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20941px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F59278i26301286FE000DE4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%2278e80717-6ba1-4802-b386-ef437fd36bb7.png%22%20title%3D%2278e80717-6ba1-4802-b386-ef437fd36bb7.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3ELearn%20more%20about%20it%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fleverage-azure-security-center-to-detect-when-compromised-linux-machines-attack%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20blog%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-283768%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Community Manager

When an attacker compromises a machine, they typically have a goal in mind. Some attackers are looking for information residing on the victim’s machine or are looking for access to other machines on the victim’s network. Other times, attackers have plans to use the processing power of the machine itself or even use the machine as a launch point for other attacks. While on Linux virtual machines (VM) in Microsoft Azure we most commonly see attackers installing and running cryptocurrency mining software. This blog post will focus on the latter when an attacker wants to use the compromised machine as a launch point for other attacks.

 

Azure Security Center (ASC) utilizes an agent that runs on multiple distributions of Linux. When auditd is enabled, it collects logs including process creation events. These are run through the detection pipeline to look for malicious and suspicious activity. Alerts are surfaced through the ASC portal.

 

78e80717-6ba1-4802-b386-ef437fd36bb7.png

Learn more about it in the Azure blog.