@@ -4,15 +4,15 @@ integration = ["auditd_manager"]
4
4
maturity = " production"
5
5
min_stack_comments = " New fields added: required_fields, related_integrations, setup"
6
6
min_stack_version = " 8.3.0"
7
- updated_date = " 2023/07/06 "
7
+ updated_date = " 2023/07/28 "
8
8
9
9
[rule ]
10
10
author = [" Elastic" ]
11
11
description = """
12
- Detects file events involving kernel modules in modprobe configuration files, which may indicate unauthorized
13
- access or manipulation of critical kernel modules. Attackers may tamper with the modprobe files to load malicious or
14
- unauthorized kernel modules, potentially bypassing security measures, escalating privileges, or hiding their activities
15
- within the system.
12
+ Detects file events involving kernel modules in modprobe configuration files, which may indicate unauthorized access or
13
+ manipulation of critical kernel modules. Attackers may tamper with the modprobe files to load malicious or unauthorized
14
+ kernel modules, potentially bypassing security measures, escalating privileges, or hiding their activities within the
15
+ system.
16
16
"""
17
17
from = " now-9m"
18
18
index = [" auditbeat-*" , " logs-auditd_manager.auditd-*" ]
@@ -49,7 +49,7 @@ type = "eql"
49
49
query = '''
50
50
file where host.os.type == "linux" and event.action in ("opened-file", "read-file", "wrote-to-file") and
51
51
file.path : ("/etc/modprobe.conf", "/etc/modprobe.d", "/etc/modprobe.d/*") and not
52
- (process.name in ("auditbeat", "kmod", "modprobe", "lsmod", "insmod", "modinfo", "rmmod") or process.title : ("*grep*") or process.parent.pid == 1)
52
+ (process.name in ("auditbeat", "kmod", "modprobe", "lsmod", "insmod", "modinfo", "rmmod", "dpkg", "cp" ) or process.title : ("*grep*") or process.parent.pid == 1)
53
53
'''
54
54
55
55
[[rule .threat ]]
0 commit comments