heroui logo

Linux Kernel Module Commands

Anvilogic Forge

View Source
Summary
The rule targets the detection of potential malicious modifications to the Linux kernel via Loadable Kernel Modules (LKMs). Adversaries often leverage LKMs to gain persistence or escalate privileges by ensuring that malicious code is executed during the system boot process or when certain commands are run. The detection logic utilizes the CrowdStrike Falcon Data Replicator (FDR) to monitor process events within the last two hours, filtering specifically for any commands that are indicative of LKM activity such as 'insmod', 'rmmod', 'modprobe', etc. By employing regular expressions within the SQL query, it can effectively capture any relevant occurrences regardless of case sensitivity. This detection is critical in environments where security and integrity of the Linux kernel are paramount, as it can serve as an early warning system against rootkits or unauthorized kernel manipulations.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1014
  • T1547.006
Created: 2024-02-09