← Back to SOC feed Coverage →

Remote Access Tool - Team Viewer Session Started On Linux Host

sigma LOW SigmaHQ
T1133
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use TeamViewer to establish remote access sessions on Linux hosts to exfiltrate data or maintain persistence. SOC teams should proactively hunt for this behavior to identify potential unauthorized remote access attempts in their Azure Sentinel environment.

Detection Rule

Sigma (Original)

title: Remote Access Tool - Team Viewer Session Started On Linux Host
id: 1f6b8cd4-3e60-47cc-b282-5aa1cbc9182d
related:
    - id: ab70c354-d9ac-4e11-bbb6-ec8e3b153357
      type: similar
    - id: f459ccb4-9805-41ea-b5b2-55e279e2424a
      type: similar
status: test
description: |
    Detects the command line executed when TeamViewer starts a session started by a remote host.
    Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.
references:
    - Internal Research
author: Josh Nickels, Qi Nan
date: 2024-03-11
tags:
    - attack.persistence
    - attack.initial-access
    - attack.t1133
logsource:
    category: process_creation
    product: linux
detection:
    selection:
        ParentImage|endswith: '/TeamViewer_Service'
        Image|endswith: '/TeamViewer_Desktop'
        CommandLine|endswith: '/TeamViewer_Desktop --IPCport 5939 --Module 1'
    condition: selection
falsepositives:
    - Legitimate usage of TeamViewer
level: low

KQL (Azure Sentinel)

imProcessCreate
| where (ParentProcessName endswith "/TeamViewer_Service" or ActingProcessName endswith "/TeamViewer_Service") and TargetProcessName endswith "/TeamViewer_Desktop" and TargetProcessCommandLine endswith "/TeamViewer_Desktop --IPCport 5939 --Module 1"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_remote_access_tools_teamviewer_incoming_connection.yml