heroui logo

Suspicious Kernel Feature Activity

Elastic Detection Rules

View Source
Summary
The rule titled "Suspicious Kernel Feature Activity" is designed to detect potentially malicious activity regarding Linux kernel feature modifications. The focus is on built-in commands that attackers might exploit to weaken kernel protections or collect sensitive information. Key targets of the detection are modifications to critical files and parameters such as `/etc/sysctl.conf`, `/proc/sys/kernel/nmi_watchdog`, and various ASLR settings. The rule utilizes EQL to monitor processes where a command execution can indicate an attempt to disable, alter or bypass kernel security features. The threat detection is particularly relevant to maintain kernel integrity against adversary tactics related to defense evasion and discovery. It captures potentially malicious executions while excluding legitimate usage by ensuring the parent process is not a standard shell environment. The rule entails a low risk score of 21, emphasizing its usefulness in environments where kernel-level changes could lead to significant security breaches.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
ATT&CK Techniques
  • T1562
  • T1562.006
  • T1553
  • T1082
Created: 2025-04-29