heroui logo

Linux Auditd Insert Kernel Module Using Insmod Utility

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect the insertion of Linux kernel modules through the insmod command, an action that could indicate a potential security threat such as the installation of a rootkit or unauthorized module. The detection mechanism leverages Linux Auditd, specifically monitoring process execution logs to capture use of the insmod command. This is critical because malicious kernel modules can allow attackers elevated privileges, enabling them to bypass security controls and potentially gain persistent access to compromised systems. The detection rule processes audit logs for syscall events, focusing on parameters such as command names and associated process details to ascertain whether this potentially harmful operation has been executed. If such an event is logged, it indicates that an investigation into the legitimacy of the kernel module insertion is warranted.
Categories
  • Linux
  • Endpoint
Data Sources
  • Kernel
  • Process
  • Logon Session
ATT&CK Techniques
  • T1547.006
  • T1547
Created: 2024-12-19