Rule Info
Name
Critical Log Manipulation via Sed Utility
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Description
Detects critical log manipulation attempts using the sed utility with in-place editing on sensitive log files.
This technique can be used by attackers to cover their tracks after gaining unauthorized access to a system.
Date
2026-03-26 00:00:00
Modified
None
Id
8f9a2b3c-4d5e-6f7a-8b9c-0d1e2f3a4b5c
Tags
attack.defense-evasion attack.t1070.002
Type
Nextron Sigma feed only (private)
