Cloud security threats are always evolving. While many focus on the network layer, insidious threats like cryptocurrency miners, rootkits, and sophisticated malware target the heart of your virtual machines (VMs). Google Cloud's Security Command Center (SCC) offers a powerful solution: VM Threat Detection.
VM Threat Detection findings are high-severity threats that we recommend you fix immediately
What is VM Threat Detection?
How VM Threat Detection Works
Powered by Google Cloud's threat detection rules, VM Threat Detection analyzes information about software running on VMs, including a list of application names, per-process CPU usage, hashes of memory pages, CPU hardware performance counters, and information about executed machine code to determine whether any application matches known cryptocurrency mining signatures. When possible, VM Threat Detection then determines the running process associated with the detected signature matches and includes information about that process in the finding.
New Preview Features: Rootkits and Malware on Disk
The power of VM Threat Detection is expanding! Now in preview, it can detect kernel-mode rootkits and scan your VMโs persistent disk for malware.
VM Threat Detection infers the type of operating system running on the VM and uses that information to determine the kernel code, read-only data regions, and other kernel data structures in memory. VM Threat Detection applies various techniques to determine if those regions are tampered with, by comparing them to precomputed hashes that are expected for the kernel image and verifying the integrity of important kernel data structures.
VM Threat Detection takes short-lived clones of your VM's persistent disk, without disrupting your workloads, and scans the disk clones. This service analyzes executable files on the VM to determine whether any files match known malware signatures. The generated finding contains information about the file and the malware signatures detected.
Benefits of VM Threat Detection
If you activate the Premium tier of Security Command Center, VM Threat Detection scans are automatically enabled. If needed, you can disable the service and/or enable the service at the project level.
https://cloud.google.com/security-command-center/docs/concepts-vm-threat-detection-overview
Are you using VM Threat Detection? Share your experiences in the comments!
Remember, this exciting rootkit and disk scanning feature is in preview. Your feedback is valuable to make VM Threat Detection even better!
We've recently encountered a concerning trend of "Defense Evasion: Unexpected kernel code modification" alerts in Google Cloud Security Command Center (SCC). Unfortunately, these alerts lack detailed descriptions, hindering our ability to efficiently triage potential security incidents.
While we understand the importance of security, we're concerned about the following aspects:
These issues create significant challenges, as we're receiving numerous alerts with minimal information, making it time-consuming and difficult to prioritize potential security risks.
Possible Solutions:
We appreciate Google Cloud's commitment to security, but the current situation with these alerts is creating unnecessary workload and making it difficult to effectively manage security risks. We believe the proposed solutions would significantly improve our ability to effectively utilize SCC and address security concerns within our environment.
Thanks for your comments and apologies for the slight delay on my side on this topic, i've been away from my standard access for a few weeks.
Preview offerings are frequently made public, but they are not always feature-complete as we see on this one as well with some of the limited information on remediation and such.
In regards to this specific alert memory forensics techniques are used by VMTD to analyze the contents of the VM's memory and identify any changes made by the suspect application. Examining memory regions that are normally inaccessible to user-mode processes, such as the kernel stack or kernel data structures, can be part of this. VMTD is alerting because it has detected a change in the kernel code loaded in the VM memory. It currently lacks the ability to specify which application changed the code or provide additional information about the change. This feature planned to be added in the future.
In this current and similar situations my best course of recommendations would be to raise these issues as a support ticket to provide additional visibility and tracking for the issue. They may also be able to supply additional guidance or documentation if such is available.
If you have access to, i would also recommend highlighting this issue with your Customer Success Manager, Technology Solutions Consultant or Security Advisor. They are working with our users to identify and help with such feedback back to engineering and product management.
The feedback provided here on our community forums are also greatly valuable for us as it gives additional visibility from the user community. We frequently monitor these channels and I will reflect the information supplied here to our customer success and product management teams.
Thank you for your time and updates on this topic!