heroui logo

Cisco Isovalent - Potential Escape to Host

Splunk Security Content

View Source
Summary
This detection rule from Cisco Isovalent focuses on identifying potential container escape or reconnaissance attempts in a Kubernetes environment by monitoring the rapid execution of multiple suspicious Linux commands. The rule aggregates process execution logs and checks for occurrences of the commands `nsenter`, `mount`, `ps aux`, and `ls` executed within short, successive time frames. If two or more distinct commands are executed in quick succession, it may indicate an attacker's attempt to break container isolation and escalate privileges. Such behavior is crucial for security operations centers (SOCs) to intercept as it signifies potential adversarial activities attempting to pivot from containers to the host. The detection employs a search logic that computes the number of events and distinct commands per 5-minute time buckets, ensuring that the execution duration is monitored and that suspicious activities are flagged for further investigation. This detection is vital for maintaining the security integrity of Kubernetes deployments.
Categories
  • Containers
  • Kubernetes
  • Endpoint
Data Sources
  • Pod
  • Container
  • Process
ATT&CK Techniques
  • T1611
Created: 2025-11-18