Mount command was executed from within a Kubernetes pod to list all the attached filesystems

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2026-02-02
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

Kubernetes - AGENT

ATT&CK Tactic

Privilege Escalation (TA0004)

ATT&CK Technique

Escape to Host (T1611)

Severity

Low

Description

The mount command was executed inside a Kubernetes pod to list all the attached filesystems, which may serve as a precursor to container escape and host filesystem access.

Attacker's Goals

Access to the host filesystem.

Investigative actions

  • Look for additional suspicious activities.
  • Verify if there was an attempt to access the host system.

Variations

Unusual mount command was executed from within a Kubernetes pod to list all the attached filesystems

Synopsis

ATT&CK Tactic

Privilege Escalation (TA0004)

ATT&CK Technique

Escape to Host (T1611)

Severity

Medium

Description

The mount command was executed inside a Kubernetes pod to list all the attached filesystems, which may serve as a precursor to container escape and host filesystem access.

Attacker's Goals

Access to the host filesystem.

Investigative actions

  • Look for additional suspicious activities.
  • Verify if there was an attempt to access the host system.