heroui logo

Loadable Kernel Module Configuration File Creation

Elastic Detection Rules

View Source
Summary
The rule "Loadable Kernel Module Configuration File Creation" is designed to detect the creation or renaming of files associated with Loadable Kernel Modules (LKMs) on Linux systems. Attackers often manipulate LKM config files to ensure that malicious modules load on system startup, leading to persistent access on the compromised machine. This rule utilizes EQL (Event Query Language) to monitor file events occurring in critical directories such as /etc/modules, /etc/modprobe.d, and others. The detection logic filters out benign actions performed by trusted package managers and system administration tools to minimize false positives. By leveraging risk scoring and specified actions, this rule provides a proactive approach to identifying potential persistence mechanisms that may be indicative of a security compromise. Administrators and security teams should closely examine the context of generated alerts, correlating with additional activities and user behaviors to determine the potential impact of any detected file changes.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1547
  • T1547.006
  • T1014
Created: 2024-12-17