heroui logo

Potential Container Escape via Modified release_agent File

Elastic Detection Rules

View Source
Summary
This detection rule identifies attempts to modify the CGroup release_agent file from a privileged container, a potential indicator of a container escape or privilege escalation attack. The release_agent file is critical as it executes a script upon process termination within a specific CGroup. Attackers exploiting privilege (such as those granted by the SYS_ADMIN capability) can alter this file, possibly allowing them to execute malicious code on the host system upon process termination. The rule uses EQL to search for events where the `event.module` is `cloud_defend`, `event.action` is `open`, and `event.type` is `change`, focusing specifically on changes to the `release_agent` file. The risk score of 47 signifies a medium level of concern, and the rule aims to enhance detection within Linux-based containerized environments.
Categories
  • Containers
  • Linux
  • Cloud
Data Sources
  • Container
  • File
  • Network Traffic
ATT&CK Techniques
  • T1611
Created: 2023-10-26