heroui logo

Linux Medusa Rootkit

Splunk Security Content

View Source
Summary
The Linux Medusa Rootkit detection rule aims to identify file creation events associated with the installation of the Medusa rootkit, which is a userland rootkit utilizing LD_PRELOAD to implement processes for hiding, credential theft, and backdoor access. The detection leverages Sysmon for Linux EventID 11 to monitor specific file creation patterns that are indicative of the rootkit's installation activities, including the deployment of shared object libraries and configuration files within critical system directories. By focusing on the file paths where these artifacts are typically created, the rule allows for early detection of potential compromises before the rootkit can fully establish control over the host. The search employed is based on the Endpoint data model within Splunk, ensuring that all relevant fields are mapped correctly for efficient monitoring and alerting. The implementation guidelines emphasize the importance of ingesting comprehensive telemetry from EDR agents, including command-line executions and process information, facilitating effective threat intelligence gathering and response actions.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • File
ATT&CK Techniques
  • T1014
  • T1589.001
Created: 2025-08-05