
Summary
This detection rule identifies attempts to modify the CGroup release_agent file from a privileged container, a potential indicator of a container escape or privilege escalation attack. The release_agent file is critical as it executes a script upon process termination within a specific CGroup. Attackers exploiting privilege (such as those granted by the SYS_ADMIN capability) can alter this file, possibly allowing them to execute malicious code on the host system upon process termination. The rule uses EQL to search for events where the `event.module` is `cloud_defend`, `event.action` is `open`, and `event.type` is `change`, focusing specifically on changes to the `release_agent` file. The risk score of 47 signifies a medium level of concern, and the rule aims to enhance detection within Linux-based containerized environments.
Categories
- Containers
- Linux
- Cloud
Data Sources
- Container
- File
- Network Traffic
ATT&CK Techniques
- T1611
Created: 2023-10-26