
Summary
This detection rule identifies suspicious use of the `modprobe` command to unload kernel modules on Linux systems. The command `modprobe` is typically used to manage kernel modules, including loading and unloading them. Unauthorized unloading of modules is of particular concern as it may indicate attempts to disable critical security features, logging capabilities, or even conceal malicious activities. By monitoring the execution of the `modprobe -r` command (which is used to remove modules), this rule aims to detect potential tampering with kernel functionality that poses threats to system integrity. Security teams can leverage this detection to investigate such instances further and mitigate risks associated with unauthorized modifications to the kernel.
Categories
- Linux
- Endpoint
Data Sources
- Kernel
- Process
- Logon Session
ATT&CK Techniques
- T1547.006
- T1547
Created: 2025-01-16