heroui logo

Sensitive Files Compression Inside A Container

Elastic Detection Rules

View Source
Summary
The detection rule named 'Sensitive Files Compression Inside A Container' identifies the utilization of compression utilities such as zip, tar, and gzip to collect sensitive files within a containerized Linux environment. It specifically targets the execution of these utilities, flagging instances where they compress known sensitive files like SSH keys, AWS configurations, and other critical system files. The rule analyzes process events and requires data collected through Elastic Defend, an integration that allows Elastic Agent to monitor host events. By implementing this rule, security teams can detect potential unauthorized activities indicative of data exfiltration or credential access by adversaries. The setup for this rule includes prerequisites such as having the Elastic Agents properly configured and the integration with Elastic Defend enabled. The investigation guide highlights necessary steps for analyzing alerts generated by this rule, addressing common false positives, and outlining response measures to mitigate threats.
Categories
  • Containers
  • Linux
Data Sources
  • Container
  • Process
  • Application Log
ATT&CK Techniques
  • T1552
  • T1552.001
  • T1560
  • T1560.001
Created: 2025-03-12