
Summary
This detection rule is designed to identify when processes attempt to read or list the file ".dockerenv" within a Docker container environment. The presence of this file typically indicates that the process is running inside a Docker container, and its access can signify an attempt at container discovery by a potential attacker. The rule captures events generated by command-line processes that end with specific commands like `/cat`, `/dir`, `/find`, `/ls`, `/stat`, `/test`, and `grep`, specifically targeting instances where these commands end with `.dockerenv`. This ensures that any attempts to enumerate the container environment are flagged for further investigation. The overall risk is classified as low, given that there may be legitimate uses for accessing this file by system administrators or certain container management tools that require awareness of their operational context. Users must be aware of possible false positives from benign administrative or automated processes that may trigger this detection.
Categories
- Linux
- Containers
- Cloud
Data Sources
- Process
- File
Created: 2023-08-23