
Summary
This threat detection rule is designed to identify the generation of new GRUB configuration files via built-in Linux utilities such as `grub-mkconfig`, `grub2-mkconfig`, and `update-grub`. The GRUB (Grand Unified Bootloader) configuration file is crucial for the system's boot process as it establishes the parameters for loading the Linux kernel and initramfs. Attackers may exploit these utilities to create malicious GRUB configurations that include harmful kernel parameters or options, enabling them to maintain persistence on compromised systems. The rule employs EQL (Event Query Language) to monitor process events on Linux systems and flags any execution of the GRUB configuration utilities that are initiated by suspicious or atypical parent processes. A spotlight is placed on ensuring that legitimate processes like `sudo`, `dnf`, and others listed in the exclusion criteria do not trigger false positives. Investigations may include analyzing command-line arguments and user activity associated with the execution of these processes.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Application Log
- Container
ATT&CK Techniques
- T1542
- T1543
- T1574
Created: 2025-01-16