heroui logo

Process Killing Detected via Defend for Containers

Elastic Detection Rules

View Source
Summary
This rule detects Linux container process termination attempts by monitoring containerized process executions that invoke process-killing utilities (kill, pkill, killall) or wrappers (bash/sh) with kill-related arguments. It fires when a process starts (event.type == "start") with event.action == "exec" inside a container (container.id pattern) and the command lineage indicates an attempt to terminate services, agents, or competing processes. It accounts for tools that spawn the target utility as a subprocess (e.g., shells invoking kill via args) while excluding benign operations like manual pages or simple file permission changes to reduce false positives. The detection maps to MITRE ATT&CK T1489 (Service Stop) under the Impact tactic (TA0040). The rule is designed to catch adversaries seeking to seize control of a workload by stopping essential services or security tooling, potentially preceding persistence or resource manipulation. Triage/analysis guidance covers correlating the kill event with exec/attach activity, health checks, pod restarts, and startup scripts; assessing whether the kill was admin-initiated or malicious; and looking for corroborating disruption indicators. Response guidance includes quarantining the pod/container, collecting volatile artifacts (process tree, PID/name, signal, network connections, filesystem diffs), redeploying from trusted images, rotating credentials/tokens, and applying least-privilege and runtime policy controls to deny process-termination utilities where not required. False positives may arise from legitimate maintenance or debugging workflows that terminate processes during deployments or troubleshooting.
Categories
  • Containers
  • Linux
Data Sources
  • Process
  • Container
ATT&CK Techniques
  • T1489
Created: 2026-03-05