Detection Library
mediumexperimentalLinuxOCIT1560

Linux Agent Compressing User Data

Detects AI agent runtimes spawning archive utilities (tar, zip, gzip) which may indicate data staging prior to exfiltration, a common tool misuse pattern in AI agent attacks.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aitool-misusearchivingdata-staginglinuxociowasp-asi02

Problem Statement

Data compression is a standard pre-exfiltration step. AI agents performing compression operations on user data or sensitive directories indicates they have been redirected to collect and stage information for unauthorized transfer.

Sample Logs

{"timestamp":"2025-01-10T14:55:00Z","computer_name":"oci-worker-07","user":"agent_svc","image":"/bin/tar","command_line":"tar czf /tmp/data_exfil.tar.gz /home/agent_svc/documents/","parent_image":"/usr/bin/python3"}

Required Fields

image
command_line
parent_image
user
computer_name

False Positives

  • ·Data processing pipelines that compress output files as part of normal workflow
  • ·Backup agents that archive logs or application data

Tuning Guidance

Correlate compression events with subsequent network transfers. Alert specifically when archive targets include home directories, credential paths, or cloud config files.