heroui logo

Direct Interactive Kubernetes API Request Detected via Defend for Containers

Elastic Detection Rules

View Source
Summary
This rule is designed to detect the execution of direct interactive Kubernetes API requests from within a container, which could indicate an adversary's attempt to gain unauthorized access or escalate privileges within a Kubernetes cluster. The rule specifically flags the use of utilities such as `curl`, `wget`, `openssl`, `busybox`, `socat`, `ncat`, and `kubectl` when they are being used to call the Kubernetes API with potentially malicious intent, such as when making requests that include a bearer token, especially under insecure configurations. The rule evaluates the process interactions to identify any unauthorized actions or lateral movements within the cluster. False positives may occur in cases where legitimate debugging or troubleshooting activities are performed using these tools. In case of detection, thorough investigation steps are recommended to determine the legitimacy of the request and to respond appropriately if malicious activity is confirmed.
Categories
  • Kubernetes
  • Cloud
  • Containers
  • Linux
Data Sources
  • Container
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1613
Created: 2026-01-21