heroui logo

OSSEC Rootkit Detected via Osquery

Panther Rules

View Source
Summary
The "OSSEC Rootkit Detected via Osquery" rule is designed to identify potential rootkits on hosts by leveraging the OSSEC rootkit detection pack through Osquery. It analyzes logs to determine if any indications of rootkits are present based on specific log events generated by Osquery. This rule is categorized under the 'Malware' and 'Defense Evasion:Rootkit' tags, implicating its relevance to identifying evasive malware techniques. It integrates into security monitoring frameworks, allowing organizations to strengthen their detection capabilities. When invoked, the rule checks for specific conditions in the received logs, notably focusing on actions recorded within the Osquery framework. The severity level is set to medium, highlighting a significant potential threat that requires verification. Upon detection of a rootkit, the recommended actions include verifying the rootkit's presence and re-imaging the affected machine, which is critical for remediation and security integrity. Furthermore, the rule is tied to the MITRE ATT&CK Framework under tactic TA0005 with technique T1014 (Rootkit Detection), providing structured context to the threat detection strategy.
Categories
  • Endpoint
  • macOS
  • Linux
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • Application Log
ATT&CK Techniques
  • T1014
Created: 2022-09-02