← Back to SOC feed Coverage →

User Added To Root/Sudoers Group Using Usermod

sigma MEDIUM SigmaHQ
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

A user being added to the root or sudoers group via usermod indicates potential privilege escalation by an adversary seeking elevated access. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify unauthorized elevation of privileges and mitigate lateral movement or persistence risks.

Detection Rule

Sigma (Original)

title: User Added To Root/Sudoers Group Using Usermod
id: 6a50f16c-3b7b-42d1-b081-0fdd3ba70a73
status: test
description: Detects usage of the "usermod" binary to add users add users to the root or suoders groups
references:
    - https://pberba.github.io/security/2021/11/23/linux-threat-hunting-for-persistence-account-creation-manipulation/
    - https://www.configserverfirewall.com/ubuntu-linux/ubuntu-add-user-to-root-group/
author: TuanLe (GTSC)
date: 2022-12-21
tags:
    - attack.privilege-escalation
    - attack.persistence
logsource:
    product: linux
    category: process_creation
detection:
    selection:
        Image|endswith: '/usermod'
        CommandLine|contains:
            - '-aG root'
            - '-aG sudoers'
    condition: selection
falsepositives:
    - Legitimate administrator activities
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/usermod" and (TargetProcessCommandLine contains "-aG root" or TargetProcessCommandLine contains "-aG sudoers")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_usermod_susp_group.yml