
Summary
The rule 'Triple Cross eBPF Rootkit Default Persistence' is crafted to detect potential persistence mechanisms utilized by the Triple Cross malware family on Linux systems. Specifically, it monitors for the creation of files named 'ebpfbackdoor' within the 'cron.d' and 'sudoers.d' directories, which are often associated with backdoor persistence methods. The persistence technique involved is related to the usage of eBPF (Extended Berkeley Packet Filter) that can allow for malicious kernel-level behavior while remaining stealthy in the system. This detection rule is positioned to alert security teams of possible indicators of compromise, allowing for timely investigation and mitigation actions. The detection leverages file event logging on Linux platforms to identify the specified target filenames, thus providing a crucial line of defense against advanced threats that seek to establish long-lasting footholds in the environment.
Categories
- Linux
- Endpoint
Data Sources
- File
Created: 2022-07-05