Skip to content

Cron

In the Deepening Control phase, adversaries leverage Unix/Linux-based system scheduled task functionality, particularly the Cron utility, to establish persistence and automate malicious operations within compromised applications or underlying systems. Cron jobs enable attackers to schedule commands or scripts to run periodically at fixed intervals, dates, or times, providing a reliable mechanism for maintaining access across system reboots or user sessions. An attacker with sufficient privileges can modify crontab files directly (/etc/crontab, /etc/cron.d/, or user-specific crontabs) to execute malicious code, maintain backdoors, perform lateral movement operations, or escalate privileges at predetermined times. This technique is particularly effective because Cron jobs operate with the permissions of the user who created them (or with root privileges if placed in system-wide crontabs), run silently in the background, and are often overlooked during security monitoring due to their legitimate administrative purpose. Sophisticated attackers may obfuscate their Cron entries or create them with innocuous names to blend with legitimate scheduled tasks, making detection more challenging for defenders not specifically monitoring for unauthorized crontab modifications.