Critical Log Manipulation via Sed Utility

Rule Info

Name
Critical Log Manipulation via Sed Utility
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Description
Detects critical log manipulation attempts using the sed utility with in-place editing on sensitive log files. This technique can be used by attackers to cover their tracks after gaining unauthorized access to a system.
Date
2026-03-26 00:00:00
Modified
None
Id
8f9a2b3c-4d5e-6f7a-8b9c-0d1e2f3a4b5c
Tags
attack.defense-evasion attack.t1070.002
Type
Nextron Sigma feed only (private)

Rule History