
Summary
This detection rule targets the creation of files within the Linux kernel/driver directory, an area typically reserved for kernel modules and drivers. The detection leverages data from Sysmon for Linux, specifically focusing on Event ID 11, to identify instances where new files are created in paths that match the pattern "*/kernel/drivers/*". Such activity is significant as unauthorized file creation in this directory could indicate malicious intent, such as the installation of a rootkit, which can grant an attacker high-level privileges by executing code at the kernel level. Effective alerting on this behavior is crucial for maintaining the security and integrity of the system, as such unauthorized changes could lead to severe compromises of the entire environment.
Categories
- Linux
- Endpoint
Data Sources
- Pod
ATT&CK Techniques
- T1547.006
- T1547
Created: 2024-11-13