Adversaries may modify the kernel to automatically execute programs on system boot. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. They extend the functionality of the kernel without the need to reboot the system. For example, one type of module is the device driver, which allows the kernel to access hardware connected to the system.[1]
When used maliciously, LKMs can be a type of kernel-mode Rootkit that run with the highest operating system privilege (Ring 0).[2] Common features of LKM based rootkits include: hiding itself, selective hiding of files, processes and network activity, as well as log tampering, providing authenticated backdoors, and enabling root access to non-privileged users.[3]
Kernel extensions, also called kext, are used in macOS to load functionality onto a system similar to LKMs for Linux. Since the kernel is responsible for enforcing security and
the kernel extensions run as apart of the kernel, kexts are not governed by macOS security policies. Kexts are loaded and unloaded through kextload
and
kextunload
commands. Kexts need to be signed with a developer ID that is granted privileges by Apple allowing it to sign Kernel extensions. Developers without these
privileges may still sign kexts but they will not load unless SIP is disabled. If SIP is enabled, the kext signature is verified before being added to the AuxKC.[4]
Since macOS Catalina 10.15, kernel extensions have been deprecated in favor of System Extensions. However, kexts are still allowed as "Legacy System Extensions" since there is no System Extension for Kernel Programming Interfaces.[5]
Adversaries can use LKMs and kexts to conduct Persistence and/or Privilege Escalation on a system. Examples have been found in the wild, and there are some relevant open source projects as well.[6][7][8][9][10][11][12][13]
ID | Name | Description |
---|---|---|
S0502 | Drovorub |
Drovorub can use kernel modules to establish persistence.[14] |
C0012 | Operation CuckooBees |
During Operation CuckooBees, attackers used a signed kernel rootkit to establish additional persistence.[15] |
S0468 | Skidmap |
Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines.[13] |
ID | Mitigation | Description |
---|---|---|
M1049 | Antivirus/Antimalware |
Common tools for detecting Linux rootkits include: rkhunter [16], chrootkit [17], although rootkits may be designed to evade certain detection tools. |
M1038 | Execution Prevention |
Application control and software restriction tools, such as SELinux, KSPP, grsecurity MODHARDEN, and Linux kernel tuning can aid in restricting kernel module loading.[18][19][20][21][22] |
M1026 | Privileged Account Management |
Limit access to the root account and prevent users from loading kernel modules and extensions through proper privilege separation and limiting Privilege Escalation opportunities. |
M1018 | User Account Management |
Use MDM to disable user's ability to install or approve kernel extensions, and ensure all approved kernel extensions are in alignment with policies specified in
|
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Loading, unloading, and manipulating modules on Linux systems can be detected by monitoring for the following commands:
On macOS, monitor for execution of |
DS0022 | File | File Creation |
Monitor for newly constructed files that may modify the kernel to automatically execute programs on system boot. |
File Modification |
Monitor for changes made to files that may modify the kernel to automatically execute programs on system boot. |
||
DS0008 | Kernel | Kernel Module Load |
LKMs are typically loaded into |
DS0009 | Process | Process Creation |
Monitor for newly created processes that may modify the kernel to automatically execute programs on system boot. |