Remote code execution into Kubernetes Pod

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-06-18
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

5 Days

Required Data

  • Requires:
    • XDR Agent

Detection Modules

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Container Administration Command (T1609)

Severity

Informational

Description

A container administration service was used to execute commands within a Kubernetes Pod.

Attacker's Goals

Attackers may use the container administration commands to execute commands within a Kubernetes Pod.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.

Variations

Remote code execution into Kubernetes Pod from another Pod for the first time

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Container Administration Command (T1609)

Severity

Medium

Description

A container administration service was used to execute commands within a Kubernetes Pod.

Attacker's Goals

Attackers may use the container administration commands to execute commands within a Kubernetes Pod.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.


Remote code execution into Kubernetes Pod from another Pod

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Container Administration Command (T1609)

Severity

Low

Description

A container administration service was used to execute commands within a Kubernetes Pod.

Attacker's Goals

Attackers may use the container administration commands to execute commands within a Kubernetes Pod.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.


Remote code execution into Kubernetes Pod for the first time

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Container Administration Command (T1609)

Severity

Low

Description

A container administration service was used to execute commands within a Kubernetes Pod.

Attacker's Goals

Attackers may use the container administration commands to execute commands within a Kubernetes Pod.

Investigative actions

Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.