<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auditbeat — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/auditbeat/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 16:24:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/auditbeat/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</link><pubDate>Thu, 30 Apr 2026 16:24:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</guid><description>This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>CVE-2026-31431, dubbed Copy Fail, is a Linux kernel vulnerability that allows an attacker to write controlled bytes into the page cache of a readable file by abusing the <code>authencesn</code> AEAD path through AF_ALG and <code>splice()</code>. Public exploitation targets setuid-root binaries such as <code>/usr/bin/su</code>, then executes the corrupted in-memory copy to gain root. The vulnerability lies in the shared host page cache, making container-originated activity a possible node-compromise attempt. This exploit leverages the AF_ALG interface, which, while uncommon for unprivileged users, may be used in specific environments like kernel crypto testing or HSM integrations. Defenders should prioritize patching vulnerable kernels and restricting AF_ALG socket creation for untrusted workloads to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates multiple AF_ALG socket creation events (auditd.data.syscall == &ldquo;socket&rdquo; and auditd.data.a0 == &ldquo;26&rdquo;) or splice operations.</li>
<li>The attacker leverages the vulnerability to corrupt the page cache of a setuid-root binary, such as <code>/usr/bin/su</code>.</li>
<li>The attacker executes the targeted setuid-root binary (e.g., <code>/usr/bin/su</code>).</li>
<li>Due to the corrupted page cache, the executed binary behaves in an unexpected manner, leading to a privilege escalation.</li>
<li>The process transitions to a root UID, indicating successful privilege escalation.</li>
<li>A root shell is spawned, providing the attacker with elevated privileges.</li>
<li>The attacker performs actions requiring root privileges, such as creating persistence mechanisms or accessing sensitive credentials.</li>
<li>The attacker potentially compromises the entire host or node, especially in containerized environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to privilege escalation, allowing attackers to gain root access on the affected Linux system. This can result in complete system compromise, data exfiltration, and the ability to install malware or create persistent backdoors. In containerized environments, a compromised container can lead to node compromise, affecting other containers running on the same host. The vulnerability affects systems running vulnerable kernel versions, potentially impacting a wide range of servers and workstations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Socket Creation Burst&rdquo; to detect initial exploitation attempts based on AF_ALG socket activity.</li>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Privilege Escalation&rdquo; to detect privilege escalation attempts by monitoring executed processes with an effective user ID of root.</li>
<li>Immediately patch the kernel with the vendor fix for CVE-2026-31431 to eliminate the underlying vulnerability.</li>
<li>Until patching is possible, consider blocking <code>algif_aead</code> module loading or restricting AF_ALG socket creation via seccomp for untrusted workloads.</li>
<li>Add audit rules for <code>socket</code>, <code>splice</code>, and <code>bind</code> events as described in the rule&rsquo;s Setup instructions to ensure comprehensive monitoring of AF_ALG related syscalls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category><category>cve-2026-31431</category></item><item><title>Unusual Process Connecting to Docker or Containerd Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</guid><description>An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.</description><content:encoded><![CDATA[<p>This threat involves unauthorized processes connecting directly to container runtime sockets (Docker or Containerd) on Linux systems. This bypasses Kubernetes API server restrictions, potentially allowing attackers to create, execute, or manipulate containers without proper authorization or logging. The risk lies in attackers circumventing RBAC, admission webhooks, and pod security standards. The attack can start when a compromised process attempts to connect to the Docker or Containerd socket, potentially leading to privilege escalation and lateral movement within the containerized environment. This attack is significant because it undermines core security controls within container orchestration platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or compromised process gains initial access to the host system.</li>
<li>The process attempts to connect to the container runtime socket (e.g., <code>/var/run/docker.sock</code> or <code>/run/containerd/containerd.sock</code>).</li>
<li>The process bypasses the Kubernetes API server and associated security controls.</li>
<li>The attacker exploits the direct socket connection to create a new container.</li>
<li>The attacker gains access to sensitive data or resources within the container.</li>
<li>The attacker escalates privileges within the compromised container.</li>
<li>The attacker uses the compromised container to move laterally to other containers or hosts within the environment.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Kubernetes security measures, create unauthorized containers, and potentially gain control over the entire cluster. The observed impact includes privilege escalation, lateral movement, and data exfiltration. The severity of this attack depends on the level of access granted to the compromised container and the sensitivity of the data and resources within the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Auditd Manager to capture network and socket events, specifically monitoring for <code>connect</code> calls to Unix sockets as described in the <a href="https://docs.elastic.co/integrations/auditd_manager">Auditd Manager documentation</a>.</li>
<li>Deploy the Sigma rule &ldquo;Unusual Process Connecting to Docker or Containerd Socket&rdquo; to detect suspicious processes connecting to container runtime sockets, tuning <code>process.executable</code> and <code>user.name</code> for known legitimate processes.</li>
<li>Monitor file permissions on the socket paths (<code>/var/run/docker.sock</code>, <code>/run/docker.sock</code>, <code>/var/run/containerd/containerd.sock</code>, <code>/run/containerd/containerd.sock</code>) and restrict access to trusted groups only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>lateral-movement</category><category>linux</category></item><item><title>Suspicious Unshare Usage for Namespace Manipulation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unshare-namespace-manipulation/</guid><description>The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.</description><content:encoded><![CDATA[<p>The <code>unshare</code> command in Linux is a utility used to create new namespaces, providing isolation for processes. While crucial for containerization and security, attackers can misuse <code>unshare</code> to escape container boundaries or escalate privileges by manipulating system namespaces. This occurs by creating namespaces that bypass established security controls. This activity is often observed when threat actors attempt to gain unauthorized access to host resources or elevate their privileges within a compromised system. The focus of this detection is on identifying unusual <code>unshare</code> executions that deviate from legitimate system management activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system, potentially through exploiting a vulnerability in a containerized application.</li>
<li>The attacker executes the <code>unshare</code> command.</li>
<li><code>unshare</code> creates new namespaces, isolating the attacker&rsquo;s process from the rest of the system.</li>
<li>The attacker attempts to mount sensitive directories from the host system into the new namespace.</li>
<li>Using the newly gained access, the attacker attempts to modify system files, such as <code>/etc/passwd</code> or <code>/etc/shadow</code>, to create new privileged accounts.</li>
<li>The attacker leverages the elevated privileges to install persistent backdoors or malware on the host system.</li>
<li>The attacker attempts to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via <code>unshare</code> can lead to privilege escalation, container escape, and unauthorized access to sensitive resources on the host system. The impact includes potential data breaches, system compromise, and lateral movement within the network. While the number of victims is unknown, the widespread use of containerization technologies makes this a significant threat, particularly for organizations relying on Linux-based container environments and cloud infrastructures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Namespace Manipulation Using Unshare</code> to your SIEM to detect suspicious <code>unshare</code> command executions and tune for your environment.</li>
<li>Enable Auditbeat or Elastic Defend to collect the necessary process execution data to trigger the provided Sigma rule, as outlined in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review and tune the provided Sigma rule&rsquo;s exclusion list based on your environment&rsquo;s legitimate use cases for <code>unshare</code>, as described in the &ldquo;False positive analysis&rdquo; section.</li>
<li>Implement additional monitoring and alerting for unusual <code>unshare</code> usage patterns to enhance detection capabilities and prevent future occurrences as recommended in the &ldquo;Response and remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>container-escape</category><category>linux</category></item></channel></rss>