Loading of Malicious Kernel Modules

Detection of the insertion of a potentially malicious kernel module via insmod or an INIT_MODULE syscall. This suggests an attempt to gain deeper control over the Linux system by extending kernel functionality, such as disabling telemetry tracking or obscuring rootkit activity. This system call in the context of a spacecraft running Linux is rarely used therefore any use is likely malicious.

STIX Pattern

[process:image_ref.name = 'insmod' OR syscall:name = 'INIT_MODULE']

SPARTA TTPs

ID Name Description
EX-0010 Inject Malicious Code Threat actors may rely on other tactics and techniques in order to inject malicious code into the victim spacecraft. This can be done via compromising the supply chain or development environment in some capacity or taking advantage of known commands. However, once malicious code has been uploaded to the victim spacecraft, the threat actor can then trigger the code to run via a specific command or wait for a legitimate user to trigger it accidently. The code itself can do a number of different things to the hosted payload, subsystems, or underlying OS.