
Summary
This rule detects suspicious activities related to the Linux `rmmod` utility, which is used to remove kernel modules. Unauthorized use of `rmmod` may be indicative of an attacker trying to unload critical or security-related modules to disable protective features, conceal malicious activities, or disrupt system operations. The rule analyzes data from Linux Auditd, specifically monitoring syscall events where `rmmod` is executed. By employing this detection, security teams can proactively identify potential tampering with kernel modules, thereby protecting system integrity and preventing exploitation.
Categories
- Linux
- Endpoint
- Application
Data Sources
- Kernel
- Process
- Logon Session
- File
ATT&CK Techniques
- T1547.006
- T1547
Created: 2024-11-13