-
Notifications
You must be signed in to change notification settings - Fork 919
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added rule to detect LKM module injects using insmod used by rootkits for kernel hooking #1389
Added rule to detect LKM module injects using insmod used by rootkits for kernel hooking #1389
Conversation
Signed-off-by: divious1 <josehelps@gmail.com>
@d1vious: Adding the "do-not-merge/release-note-label-needed" label because no release-note block was detected, please follow our release note process to remove it. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Welcome @d1vious! It looks like this is your first PR to falcosecurity/falco 🎉 |
Signed-off-by: divious1 <josehelps@gmail.com> Signed-off-by: divious1 <josehelps@gmail.com>
Signed-off-by: divious1 <josehelps@gmail.com>
Added a commit with the DOC sign-off, also: |
/cc @Kaizhe |
It would be good to add |
Signed-off-by: divious1 <josehelps@gmail.com>
@csschwe Great suggestion 👍 , just updated the PR to include that in the output! This is a test I ran:
|
Signed-off-by: divious1 <josehelps@gmail.com> Signed-off-by: divious1 <josehelps@gmail.com>
Signed-off-by: divious1 <josehelps@gmail.com>
…o into rule_lkm_injection_detected Signed-off-by: divious1 <josehelps@gmail.com>
…o into rule_lkm_injection_detected
@d1vious: Adding label Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Signed-off-by: divious1 <josehelps@gmail.com>
Signed-off-by: divious1 <josehelps@gmail.com>
Signed-off-by: divious1 <josehelps@gmail.com>
…o into rule_lkm_injection_detected
Thanks for your pull request. Before we can look at it, you'll need to add a 'DCO signoff' to your commits. 📝 Please follow instructions in the contributing guide to update your commits with the DCO Full details of the Developer Certificate of Origin can be found at developercertificate.org. The list of commits missing DCO signoff:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Hey @d1vious First of all, thank you for your contribution! I have noticed there're merge commits that are not allowed in this repo. Could you rebase and fix that? |
What type of PR is this?
/kind rule-create
Any specific area of the project related to this PR?
/area rules
What this PR does / why we need it:
This PR adds a new falco rule that looks for when insmod is called as part of a execve event. Injecting LKM modules on (post build) running production instances should be rare and is a common way for rootkits that employ kernel hooking to obfuscate themselves.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
This is my first PR please let me know if I missed anything 😇
Does this PR introduce a user-facing change?:
Yes new rule in falco_rules.yml