heroui logo

Docker Socket Enumeration

Elastic Detection Rules

View Source
Summary
The detection rule identifies potential malicious activity related to Docker socket enumeration on Linux systems. It monitors processes that interact with the Docker socket file located at /var/run/docker.sock, a common method utilized by attackers to manipulate the Docker daemon. This interaction can lead to unauthorized operations such as creating, starting, stopping, and removing containers, allowing attackers to gain unauthorized access, escalate privileges, or conduct lateral movement within the environment. The rule leverages EQL (Event Query Language) to examine process-related events where specific keywords associated with Docker socket usage are present in the command line. The integration requires the Elastic Defend setup within the Elastic Agent framework, making it crucial for managing and analyzing container-related security events effectively. The risk score assigned to this rule is low (21), indicating a moderate concern that warrants monitoring but does not demand immediate action.
Categories
  • Endpoint
  • Containers
Data Sources
  • Process
  • Container
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1613
Created: 2025-03-04