Potential Suspicious BPF Activity - Linux
Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.
Sigma rule (View on GitHub)
1title: Potential Suspicious BPF Activity - Linux
2id: 0fadd880-6af3-4610-b1e5-008dc3a11b8a
3status: test
4description: Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.
5references:
6 - https://redcanary.com/blog/ebpf-malware/
7 - https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
8author: Red Canary (idea), Nasreddine Bencherchali
9date: 2023-01-25
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13logsource:
14 product: linux
15detection:
16 selection:
17 - 'bpf_probe_write_user'
18 condition: selection
19falsepositives:
20 - Unknown
21level: high
References
Related rules
- Abuse of Service Permissions to Hide Services Via Set-Service
- Abuse of Service Permissions to Hide Services Via Set-Service - PS
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address
- Application Using Device Code Authentication Flow