MITRE ATT&CK / T1543.002
T1543.002
Systemd Service
Description
Adversaries may create or modify systemd services to repeatedly execute malicious payloads as part of persistence. Systemd is a system and service manager commonly used for managing background daemon processes (also known as services) and other system resources.(Citation: Linux man-pages: systemd January 2014) Systemd is the default initialization (init) system on many Linux distributions replacing legacy init systems, including SysVinit and Upstart, while remaining backwards compatible.Systemd utilizes unit configuration files with the `.service` file extension to encode information about a service's process. By default, system level unit files are stored in the `/systemd/system` directory of the root owned directories (`/`). User level unit files are stored in the `/systemd/user` directories of the user owned directories (`$HOME`).(Citation: lambert systemd 2022)Inside the `.service` unit files, the following directives are used to execute commands:(Citation: freedesktop systemd.service)* `ExecStart`, `ExecStartPre`, and `ExecStartPost` directives execute when a service is started manually by `systemctl` or on system start if the service is set to automatically start. * `ExecReload` directive executes when a service restarts. * `ExecStop`, `ExecStopPre`, and `ExecStopPost` directives execute when a service is stopped.Adversaries have created new service files, altered the commands a `.service` file’s directive executes, and modified the user directive a `.se…
Platforms
Mitigations
- M1018 — User Account Management
- M1022 — Restrict File and Directory Permissions
- M1026 — Privileged Account Management
- M1033 — Limit Software Installation
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- xlabs_v1 Mirai Botnet Exploits ADB to Build IoT DDoS-for-Hire Network
- PCPJack Cloud Worm Evicts TeamPCP and Steals 40+ Credential Types at Scale
- Bleeding Llama: CVE-2026-5757 Exposes 300,000 Ollama AI Servers, No Patch Available
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →