
Summary
The rule "Suspicious Kworker UID Elevation" is designed to monitor and detect attempts at elevating regular user permissions to root privileges through the kworker process on Linux systems. Kworker processes are key components of the Linux kernel, responsible for executing time-sensitive tasks in the kernel space, such as handling interrupts and performing background processing. However, attackers might exploit these processes by disguising malicious actions as legitimate kernel activities. They may use techniques like rootkits to hijack execution flow and manipulate kernel processes to gain unauthorized root access. This detection rule identifies instances where a kworker process unexpectedly changes session IDs, particularly when it elevates itself to user ID 0, indicating it has assumed root privileges. Such behavior can be indicative of misuse or exploitation attempts by adversaries attempting to evade standard detection measures.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Kernel
- Script
ATT&CK Techniques
- T1574
- T1574.013
- T1014
Created: 2023-10-26