Kernel module directory modified
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.What happened
The process {{ @process.comm }}
modified the kernel module file {{ @file.path }}
, potentially to establish persistence or gain elevated privileges.
Goal
Kernel modules can be used to automatically execute code when a host starts up. Attackers sometimes use kernel modules to gain persistence on a particular host, ensuring that their code is executed even after a system reboot. Kernel modules can also help attackers gain elevated permissions on a system.
Loading a malicious kernel module is a type of rootkit. Rootkits often create backdoor access and hide evidence of themselves. This includes process, file, and network activity.
Strategy
Kernel modules are loaded from the /lib/modules
directory in Linux. This detection watches for all new files created under that directory.
Triage and response
- Check the name of the new kernel module created.
- Check which user or process created the module.
- If the new kernel module is not expected, contain the host or container and roll back to a known good configuration. Initiate the incident response process.
Requires Agent version 7.27 or greater