
Summary
This rule detects attempts to locate AWS credentials within Linux containers through the use of system search utilities such as `grep` and `find`. Unauthorized access to sensitive files in containers can lead to serious security risks including further compromise of the container environment and potential breakout to the underlying cloud infrastructure. By monitoring specific process actions and command lines, the rule identifies suspicious activities aimed at retrieving AWS credentials, thereby aiding in preventing data breaches and unauthorized manipulation of cloud resources. Investigation procedures are outlined to ensure thorough analysis of the events for the effective response to potential threats.
Categories
- Containers
- Linux
- Cloud
Data Sources
- Process
- Container
- Application Log
ATT&CK Techniques
- T1552
- T1552.001
Created: 2025-03-12