
Summary
This detection rule identifies impersonation attempts in Linux environments specifically when the 'kubectl' command is used. Adversaries may execute this command with parameters like '--kubeconfig', '--token', '--as', or '--as-group', suggesting an unauthorized attempt to impersonate a user or entity within a Kubernetes cluster. The rule captures process events linked to 'kubectl' executions, particularly where the arguments indicate this potential impersonation behavior. Additionally, if this rule is triggered, it could be indicative of broader malicious activity, especially when analyzed alongside rules monitoring secret access or kubeconfig file interactions. Such correlations can significantly elevate the risk assessment of the detected activities. Organizations leveraging Kubernetes should monitor these events closely to rapidly identify and mitigate potential security incidents.
Categories
- Kubernetes
- Linux
- Endpoint
- Containers
Data Sources
- Process
- Container
- Command
- Sensor Health
ATT&CK Techniques
- T1550
- T1550.001
- T1078
- T1552
- T1528
Created: 2025-06-19