
Summary
The Linux Kernel Module Enumeration rule identifies the invocation of the 'kmod' process, which is used to list kernel modules on Linux systems. This detection relies on data provided by Endpoint Detection and Response (EDR) agents, monitoring specific process names and command-line parameters. While the listing of kernel modules (using commands like 'lsmod') isn’t naturally malicious, it may indicate preparation for unauthorized actions, such as loading malicious kernel modules via 'insmod'. Such actions could lead to exploitation opportunities including privilege escalation and persistent access for attackers. The rule aggregates data to highlight instances of potential module enumeration, facilitating prompt investigative and remediation actions by security operations teams.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Logon Session
ATT&CK Techniques
- T1082
- T1014
Created: 2024-11-17