heroui logo

Cisco Isovalent - Kprobe Spike

Splunk Security Content

View Source
Summary
This analytic identifies excessive kernel probe (kprobe) events within a Kubernetes cluster in a short timeframe, indicating potential malicious activity. Kprobes are utilized in Linux for debugging and instrumentation, allowing dynamic monitoring of kernel functions and system calls. However, abnormal spikes in kprobe events—specifically more than 10 within 5 minutes—may signify suspicious behavior such as an attacker probing the kernel, potentially leading to privilege escalation or tampering with host processes. This is especially concerning in containerized environments, where such activities may hint at attempts to escape containers or interfere with the host's operations. The detection relies on Splunk to analyze kprobe activity, ensuring that organizations can respond to potential security threats effectively.
Categories
  • Kubernetes
  • Cloud
  • Endpoint
Data Sources
  • Pod
  • Process
ATT&CK Techniques
  • T1068
Created: 2026-01-05