
Summary
The detection rule 'Kubernetes API Activity from Tor Exit Node' aims to identify Kubernetes API requests made from IP addresses known to be Tor exit nodes. The usage of Tor may indicate malicious actors attempting to obscure their true identities while accessing Kubernetes clusters hosted on AWS EKS, Azure AKS, and GCP GKE. The rule functions across multiple cloud platforms, monitoring any interactions with the API that could signify an unauthorized access attempt or a broader compromised campaign. In-depth analysis is prompted upon detection, which includes reviewing API operations before and after the alert time, comparing them with typical user behavior, and checking the history of the detected Tor exit node's activities in relation to other clusters and resources. This holistic approach helps in assessing the severity and scope of the potential threat.
Categories
- Kubernetes
- Cloud
- AWS
- Azure
- GCP
Data Sources
- Pod
- Container
- User Account
- Web Credential
- Network Traffic
ATT&CK Techniques
- T1573.002
Created: 2026-02-18