
Summary
This rule identifies the execution of the 'mount' command within privileged containers, which poses a serious risk as it can allow attackers to access sensitive host files and escalate privileges. The 'mount' command connects file systems or devices to the system, potentially enabling unauthorized access to the host’s filesystem when used improperly. The detection utilizes an EQL query to monitor for instances where the mount command is invoked inside a containerized environment with elevated permissions. Given that privileged containers operate with extensive capabilities akin to the host machine, any detection of the 'mount' command execution warrants immediate investigation to ascertain if malicious activity is occurring. The rule is designed to support operational integrity by highlighting potentially harmful actions that could lead to increased vulnerabilities and exploitation of the host system.
Categories
- Containers
- Linux
Data Sources
- Container
- Process
ATT&CK Techniques
- T1611
Created: 2025-03-12