Kernel module directory modified
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Kernel modules can be used to automatically execute code when a host starts up. Attackers sometimes use kernel modules to gain persistence on a particular host, ensuring that their code is executed even after a system reboot. Kernel modules can also help attackers gain elevated permissions on a system.
Loading a malicious kernel module is a type of rootkit. Rootkits often create backdoor access and hide evidence of themselves. This includes process, file, and network activity.
Strategy
Kernel modules are loaded from the /lib/modules
directory in Linux. This detection watches for all new files created under that directory.
Triage and response
- Check the name of the new kernel module created.
- Check which user or process created the module.
- If the new kernel module is not expected, contain the host or container and roll back to a known good configuration. Initiate the incident response process.
Requires Agent version 7.27 or greater