Uncommon Linux remote shell command execution

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2026-01-04
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

Shell Analytics

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.

Variations

Uncommon Linux remote shell command execution, possibly running LinPEAS

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution using an exploitation tool

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution executing a reverse interactive shell

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution downloading a shell script

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution disabling firewall

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution taking a screenshot

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution possibly running from an XZ backdoor

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution running as root

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution setting a scheduled task

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution running a process kill command

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution loading a kernel module

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution via non-SSH or SSH on a non-standard port

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution running a network tool

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution trying to gather information about the system

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux remote shell command execution, possibly granting file execution permissions

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux from a remote source. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.