heroui logo

Kubernetes Service Account Token Theft from Pod

Panther Rules

View Source
Summary
The detection rule titled 'Kubernetes Service Account Token Theft from Pod' is specifically designed to monitor Kubernetes commands executed within pods, focusing on attempts to read service account tokens located at '/var/run/secrets/kubernetes.io/serviceaccount/token'. The rule leverages logs from Amazon EKS, Azure Monitor, and GCP to catch potential abusive behaviors often associated with credential access, privilege escalation, and lateral movement within the Kubernetes environment. By gaining exec access to a pod, an attacker can extract the service account token, enabling them to authenticate and operate as that service account on the Kubernetes API server. This grants them elevated permissions, thus posing a significant risk to the security of the cluster. The rule is categorized as 'experimental' and comes with a high severity level, signifying that intervention is crucial upon triggering. The rule also provides a detailed runbook for response actions, such as investigating the user's permissions and reviewing related service account access logs.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Pod
  • Container
  • User Account
  • Web Credential
ATT&CK Techniques
  • T1552.007
  • T1078.004
  • T1550.001
Created: 2026-02-18