heroui logo

Enable BPF Kprobes Tracing

Sigma Rules

View Source
Summary
This detection rule targets the use of BPF kprobes tracing in Linux environments. BPF (Berkeley Packet Filter) kprobes are a powerful mechanism that allows developers and security professionals to hook into kernel functions to gather data or alter behavior. This rule identifies potentially malicious or unauthorized usage of kprobes by inspecting the command line of process creations. Specifically, it looks for commands that echo '1' to enable events for kprobes and any invocations related to enabling a probe or return probe under the '/sys/kernel/debug/tracing/events/kprobes/' directory. The rule is designed to capture conditions that signify attempts at detection evasion or execution of attack payloads using kprobes. Medium-level threat concern signifies a reasonable alerting threshold, as kprobes can be used legitimately for debugging but may also signal nefarious activity if used by attackers.
Categories
  • Linux
  • Endpoint
  • Infrastructure
Data Sources
  • Process
Created: 2023-01-25