Hackers who gain code execution on a system (let’s say through an exploit) check in which user context they run, the privileges they have, and learn about the system.
That would usually go unnoticed.
Here I demonstrate how Auditd picks it up.
Rules are gathered and published by Florian Roth ( Best Practice Auditd Configuration https://github.com/Neo23x0/auditd)