Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.[1][2][3]
In Docker, adversaries may specify an entrypoint during container deployment that executes a script or command, or they may use a command such as docker exec
to execute a command within a running container.[4][5] In Kubernetes, if an adversary has sufficient permissions, they may gain remote execution in a container in the cluster via interaction with the Kubernetes API server, the kubelet, or by running a command such as kubectl exec
.[6]
ID | Name | Description |
---|---|---|
S0601 | Hildegard |
Hildegard was executed through the kubelet API run command and by executing commands on running containers.[7] |
S0599 | Kinsing |
Kinsing was executed with an Ubuntu container entry point that runs shell scripts.[8] |
S0683 | Peirates |
Peirates can use |
S0623 | Siloscape |
Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.[10] |
G0139 | TeamTNT |
TeamTNT executed Hildegard through the kubelet API run command and by executing commands on running containers.[7] |
ID | Mitigation | Description |
---|---|---|
M1042 | Disable or Remove Feature or Program |
Remove unnecessary tools and software from containers. |
M1038 | Execution Prevention |
Use read-only containers, read-only file systems, and minimal images when possible to prevent the execution of commands.[11] Where possible, also consider using application control and software restriction tools (such as those provided by SELinux) to restrict access to files, processes, and system calls in containers.[12] |
M1035 | Limit Access to Resource Over Network |
Limit communications with the container service to managed and secured channels, such as local Unix sockets or remote access via SSH. Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server.[13][14] In Kubernetes clusters deployed in cloud environments, use native cloud platform features to restrict the IP ranges that are permitted to access to API server.[15] Where possible, consider enabling just-in-time (JIT) access to the Kubernetes API to place additional restrictions on access.[16] |
M1026 | Privileged Account Management |
Ensure containers are not running as root by default. In Kubernetes environments, consider defining Pod Security Standards that prevent pods from running privileged containers and using the |
M1018 | User Account Management |
Enforce authentication and role-based access control on the container service to restrict users to the least privileges required.[11] When using Kubernetes, avoid giving users wildcard permissions or adding users to the |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor command execution within containers to detect suspicious activity. Commands executed via Docker ( Analytic 1 - Unusual command executions in container services
|
DS0009 | Process | Process Creation |
Track the creation of new processes within a container environment, which could indicate suspicious activity initiated via the Docker daemon or Kubernetes API server. Analytic 1 - Unusual process creation within containers
|