heroui logo

Potential Chroot Container Escape via Mount

Elastic Detection Rules

View Source
Summary
This detection rule is designed to monitor for an uncommon and potentially dangerous behavior in Linux environments, specifically related to container escapes. It looks for the execution of the `mount` command followed by `chroot` within a short time frame, indicating possible privilege escalation attempts. When a user within a container mounts the root file system of the host and then utilizes `chroot`, they effectively change their root directory to that of the host, allowing them to escape the containerized environment. This behavior poses a significant security risk as it can enable malicious actors to gain unauthorized access to the host system. The rule uses EQL (Event Query Language) to analyze process execution events, specifically capturing these two sequences and flagging them for investigation due to their uncommon occurrence. The detection requires integration with Elastic Defend to collect and analyze relevant process events, and it calls for a thorough investigation process due to the potential implications of such actions.
Categories
  • Endpoint
  • Containers
  • Linux
  • Cloud
Data Sources
  • Container
  • Process
  • Logon Session
  • Network Traffic
  • Script
ATT&CK Techniques
  • T1611
Created: 2024-01-15