BPFDoor Abnormal Process ID or Lock File Accessed

detects BPFDoor .lock and .pid files access in temporary file storage facility

Sigma rule (View on GitHub)

 1title: BPFDoor Abnormal Process ID or Lock File Accessed
 2id: 808146b2-9332-4d78-9416-d7e47012d83d
 3status: test
 4description: detects BPFDoor .lock and .pid files access in temporary file storage facility
 5references:
 6    - https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/
 7    - https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor
 8    - https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/
 9    - https://github.com/rapid7/Rapid7-Labs/blob/741c7196ec12a0a56b63463d1fd726ff14d3a97a/BPFDoor/rapid7_detect_bpfdoor.sh
10author: Rafal Piasecki
11date: 2022-08-10
12modified: 2026-03-30
13tags:
14    - attack.execution
15    - attack.t1106
16    - attack.t1059
17logsource:
18    product: linux
19    service: auditd
20detection:
21    selection:
22        type: 'PATH'
23        name:
24            - /var/run/aepmonend.pid
25            - /var/run/auditd.lock
26            - /var/run/cma.lock
27            - /var/run/console-kit.pid
28            - /var/run/consolekit.pid
29            - /var/run/daemon.pid
30            - /var/run/hald-addon.pid
31            - /var/run/hald-smartd.pid
32            - /var/run/haldrund.pid
33            - /var/run/hp-health.pid
34            - /var/run/hpasmlit.lock
35            - /var/run/hpasmlited.pid
36            - /var/run/kdevrund.pid
37            - /var/run/lldpad.lock
38            - /var/run/mcelog.pid
39            - /var/run/system.pid
40            - /var/run/uvp-srv.pid
41            - /var/run/vmtoolagt.pid
42            - /var/run/xinetd.lock
43    condition: selection
44falsepositives:
45    - Unlikely
46level: high

References

Related rules

to-top