heroui logo

Linux Auditd Install Kernel Module Using Modprobe Utility

Splunk Security Content

View Source
Summary
This rule aims to detect the installation of a Linux kernel module via the modprobe utility through analyzing data captured from the Linux Auditd framework. The detection mechanism is critical as it assists in identifying potentially malicious activities that might compromise system integrity, specifically regarding rootkit deployment or other unauthorized kernel modifications. The rule captures system call events that invoke the modprobe command, which is often used to load kernel modules, and relies on the detailed logging capabilities of the Auditd service. If a kernel module is installed without proper authorization, it could signify an intrusion attempt leading to elevated privileges and persistent access for malicious actors. By monitoring these syscall activities, security teams are better positioned to respond to threats and protect system resources.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • Application Log
  • Sensor Health
  • File
ATT&CK Techniques
  • T1547.006
  • T1547
Created: 2025-01-20