Fishing for hackers (part 2): Quickly identify suspicious activity with Sysdig.
Blog post from Sysdig
Sysdig has enhanced its forensics capabilities to help users identify suspicious activity more efficiently by introducing new features like the updated spy_users chisel and the list_login_shells chisel. These tools aid in analyzing command execution on Unix systems, making it easier to distinguish between interactive user sessions and automated scripts, which is crucial for identifying potential security breaches. The spy_users chisel now supports filtering based on indentation levels, allowing users to focus on significant activities, while list_login_shells helps pinpoint sessions containing specific commands or arguments, such as those often associated with hacking attempts. These improvements aim to streamline the process of detecting and investigating malicious activities, encouraging users to upgrade to the latest version of Sysdig for optimal functionality.