
Summary
This analytic rule detects the insertion of a Linux kernel module using the `insmod` utility, which may signal attempts to install rootkits or malicious kernel modules. By tracking process execution logs gathered by Endpoint Detection and Response (EDR) agents, the rule analyzes events involving specific process names such as `kmod` and `sudo`. The significance of this activity lies in its potential to enable attackers to gain elevated privileges and evade detection by security systems, leading to unauthorized system access and compromise. The detection mechanism relies on Sysmon for Linux EventID 1 logs that detail process information, including command-line arguments, which are critical for identifying kernel module insertions.
Categories
- Endpoint
- Linux
Data Sources
- Pod
- Container
- Process
ATT&CK Techniques
- T1547.006
- T1547
Created: 2024-12-17