heroui logo

Interactive Exec Command Launched Against A Running Container

Elastic Detection Rules

View Source
Summary
This rule detects the invocation of interactive 'exec' events against containers using the 'exec' command within Kubernetes environments. The 'exec' command allows a user to start a temporary shell session in a running container, which can be used for administrative tasks such as debugging. However, this command can pose a significant security risk as it enables malicious actors to run arbitrary commands within the container, potentially leading to container escape or further compromises. The rule specifically targets higher-risk commands executed interactively within containers to identify unauthorized access attempts. The detection logic focuses on monitoring process events where the command is initiated from within a container, with particular focus on interactive sessions marked by certain flags in the process metadata. This helps in tracing activities that may deviate from normal administrative usage, particularly in cases where the exec command is used inappropriately.
Categories
  • Containers
Data Sources
  • Container
  • Process
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1609
Created: 2023-05-12