<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auditd Manager — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/auditd-manager/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:45:21 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/auditd-manager/feed.xml" rel="self" type="application/rss+xml"/><item><title>Chroot Execution in Container Context on Linux</title><link>https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chroot-container-escape/</guid><description>Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of the <code>chroot</code> command being executed within a Linux containerized environment. It leverages process execution telemetry from Elastic Defend and Auditd Manager to detect potential container escape attempts. The rule focuses on processes where the name is <code>chroot</code> or the command-line arguments contain <code>chroot</code>. Container context is determined by identifying processes with a title matching <code>runc init</code>, a container workload entry leader, or <code>runc</code> as the parent process. Successful container escapes can allow attackers to gain unauthorized access to the host system. The technique is often combined with sensitive host mounts, which are then leveraged after the <code>chroot</code> to access files and processes outside the container.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, potentially through exploiting a vulnerability in the containerized application.</li>
<li>The attacker identifies sensitive host mounts within the container&rsquo;s filesystem, such as <code>/host</code>, <code>/proc/1/root</code>, or other unexpected node paths.</li>
<li>The attacker executes the <code>chroot</code> command, specifying an alternate root filesystem, typically a host-linked mount.</li>
<li>The <code>chroot</code> command redirects system calls to the new root filesystem, effectively isolating the attacker from the container&rsquo;s original environment.</li>
<li>The attacker leverages the new root filesystem to access files, directories, and processes on the host system outside the container&rsquo;s boundaries.</li>
<li>The attacker may then attempt to escalate privileges by exploiting vulnerabilities in host system services or binaries.</li>
<li>The attacker may install malware or establish persistence mechanisms on the host system.</li>
<li>The attacker uses the compromised host system to pivot to other systems on the network or to exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can lead to full compromise of the underlying host system, potentially impacting all containers running on the same host. This can enable attackers to access sensitive data, disrupt services, and move laterally within the network. In multi-tenant environments, a container escape can compromise the security of other tenants sharing the same infrastructure. A single successful container escape can lead to a widespread breach impacting numerous systems and applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Chroot Execution in Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable process execution telemetry from Elastic Defend and Auditd Manager on Linux to ensure the required data is available for detection.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the <code>chroot</code> execution was authorized and the target directory is an internal build root versus a host filesystem mount.</li>
<li>Monitor for follow-on shell execution, access to the container runtime socket, or kubelet credential paths, as these are common indicators of container escape attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category><category>chroot</category></item><item><title>Potential Root Effective Shell from Non-Standard Path via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</link><pubDate>Fri, 01 May 2026 09:51:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-root-effective-shell/</guid><description>This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies potential privilege escalation attempts on Linux systems by monitoring for processes with a root effective user ID (EUID) but a non-root real user ID (RUID), combined with the use of the <code>-p</code> flag (commonly used to preserve privileges in shells like bash or dash) and execution from a non-standard path (outside of <code>/bin</code>, <code>/sbin</code>, <code>/usr/bin</code>, etc.).  Attackers may copy or link setuid-capable shells or similar helpers into writable locations to regain a root context after local exploitation. This behavior is often associated with post-exploitation activities where attackers attempt to maintain or regain elevated privileges.  The rule relies on Auditd data to provide visibility into process execution events and user context. The original rule was published on 2026-04-24 by Elastic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with limited privileges (e.g., through exploiting a vulnerability or using stolen credentials).</li>
<li>Attacker identifies a writable directory outside of standard system binary paths (e.g., <code>/tmp</code>, <code>/var/tmp</code>).</li>
<li>Attacker copies or creates a symbolic link to a setuid-capable shell (e.g., <code>/bin/bash</code>, <code>/bin/dash</code>) into the identified writable directory. This copied shell retains the setuid bit.</li>
<li>Attacker executes the copied or linked shell from the non-standard path with the <code>-p</code> flag (e.g., <code>/tmp/bash -p</code>). The <code>-p</code> flag instructs the shell to preserve privileges, effectively running with the effective user ID (EUID) of root.</li>
<li>Auditd logs this process execution event, capturing the non-standard path, the use of the <code>-p</code> flag, the root EUID, and the non-root RUID.</li>
<li>The detection rule identifies the process execution event based on the criteria outlined above.</li>
<li>Attacker now has a root shell and can perform administrative tasks, install malware, or further compromise the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack can grant an attacker complete control over the compromised system. This allows them to access sensitive data, install malicious software, modify system configurations, and potentially pivot to other systems on the network. This can lead to data breaches, system downtime, and significant financial losses.  The risk score for this type of activity is considered high due to the potential for significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Root Effective Shell from Non-Standard Path via Auditd</code> to your SIEM and tune for your environment.</li>
<li>Ensure that Auditd Manager or Auditbeat is properly configured to collect process execution events with relevant fields (<code>event.action</code>, <code>user.id</code>, <code>user.effective.id</code>, <code>process.args</code>, and <code>process.executable</code>) as described in the rule setup to enable the rule to function correctly.</li>
<li>Investigate any alerts generated by this rule by inspecting <code>process.executable</code>, <code>process.args</code>, <code>process.parent</code>, and the full command line reconstructed in audit logs.</li>
<li>Regularly audit all setuid binaries on the filesystem to identify any unauthorized or malicious setuid executables.</li>
<li>Implement access controls and file integrity monitoring to prevent unauthorized modification of system binaries and writable directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>auditd</category></item><item><title>Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</link><pubDate>Thu, 30 Apr 2026 16:24:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31431-exploitation/</guid><description>This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>CVE-2026-31431, dubbed Copy Fail, is a Linux kernel vulnerability that allows an attacker to write controlled bytes into the page cache of a readable file by abusing the <code>authencesn</code> AEAD path through AF_ALG and <code>splice()</code>. Public exploitation targets setuid-root binaries such as <code>/usr/bin/su</code>, then executes the corrupted in-memory copy to gain root. The vulnerability lies in the shared host page cache, making container-originated activity a possible node-compromise attempt. This exploit leverages the AF_ALG interface, which, while uncommon for unprivileged users, may be used in specific environments like kernel crypto testing or HSM integrations. Defenders should prioritize patching vulnerable kernels and restricting AF_ALG socket creation for untrusted workloads to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unprivileged user initiates multiple AF_ALG socket creation events (auditd.data.syscall == &ldquo;socket&rdquo; and auditd.data.a0 == &ldquo;26&rdquo;) or splice operations.</li>
<li>The attacker leverages the vulnerability to corrupt the page cache of a setuid-root binary, such as <code>/usr/bin/su</code>.</li>
<li>The attacker executes the targeted setuid-root binary (e.g., <code>/usr/bin/su</code>).</li>
<li>Due to the corrupted page cache, the executed binary behaves in an unexpected manner, leading to a privilege escalation.</li>
<li>The process transitions to a root UID, indicating successful privilege escalation.</li>
<li>A root shell is spawned, providing the attacker with elevated privileges.</li>
<li>The attacker performs actions requiring root privileges, such as creating persistence mechanisms or accessing sensitive credentials.</li>
<li>The attacker potentially compromises the entire host or node, especially in containerized environments.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31431 leads to privilege escalation, allowing attackers to gain root access on the affected Linux system. This can result in complete system compromise, data exfiltration, and the ability to install malware or create persistent backdoors. In containerized environments, a compromised container can lead to node compromise, affecting other containers running on the same host. The vulnerability affects systems running vulnerable kernel versions, potentially impacting a wide range of servers and workstations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Socket Creation Burst&rdquo; to detect initial exploitation attempts based on AF_ALG socket activity.</li>
<li>Deploy the Sigma rule &ldquo;Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket - Privilege Escalation&rdquo; to detect privilege escalation attempts by monitoring executed processes with an effective user ID of root.</li>
<li>Immediately patch the kernel with the vendor fix for CVE-2026-31431 to eliminate the underlying vulnerability.</li>
<li>Until patching is possible, consider blocking <code>algif_aead</code> module loading or restricting AF_ALG socket creation via seccomp for untrusted workloads.</li>
<li>Add audit rules for <code>socket</code>, <code>splice</code>, and <code>bind</code> events as described in the rule&rsquo;s Setup instructions to ensure comprehensive monitoring of AF_ALG related syscalls.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>linux</category><category>vulnerability</category><category>cve-2026-31431</category></item><item><title>Curl or Wget Execution from Container Context</title><link>https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-curl-wget-container-execution/</guid><description>This rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of <code>curl</code> or <code>wget</code> being executed from within containers managed by <code>runc</code> on Linux systems. The rule leverages Auditd Manager to monitor system calls and flags processes running with the title <code>runc init</code> that then execute <code>curl</code> or <code>wget</code>. This activity is noteworthy because attackers often use these tools to download malicious payloads (stagers, scripts, implants) or to exfiltrate data after compromising a container. While these tools can be used legitimately within containers, their execution in the context of <code>runc init</code> suggests a higher risk of malicious activity. The rule focuses on narrowing the signal to the container runtime boundary where unexpected download clients are more worthy of review. The rule specifically leverages Auditd Manager for data collection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a host system, possibly through exploiting a vulnerability in an application running outside the container (e.g., web application).</li>
<li>The attacker identifies a containerized application running on the compromised host.</li>
<li>The attacker exploits a vulnerability within the container, or abuses a privileged workload within the container, to gain elevated privileges or code execution within the container.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to download additional tools or scripts into the container. These tools might include reverse shells, credential dumping tools, or data exfiltration utilities.</li>
<li>The attacker executes the downloaded tools to further compromise the container or the underlying host.</li>
<li>The attacker uses <code>curl</code> or <code>wget</code> to stage data for exfiltration to an external server. This may involve compressing and encoding data before transmission.</li>
<li>The attacker initiates the data exfiltration process using <code>curl</code> or <code>wget</code> to send the staged data to a remote server controlled by the attacker.</li>
<li>The attacker achieves their final objective, which could include data theft, system disruption, or further lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised containers can lead to data breaches, service disruptions, and further attacks on internal systems. Successful exploitation could allow attackers to steal sensitive data, install malware, or pivot to other parts of the network, impacting confidentiality, integrity, and availability. The number of affected systems depends on the scope of the container deployment and the privileges granted to the compromised container.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Curl or Wget Execution from Container Context</code> to your SIEM and tune for your environment.</li>
<li>Enable Auditd Manager with syscall coverage including <code>execve</code> to capture process execution and arguments within containers, as mentioned in the rule&rsquo;s setup instructions.</li>
<li>Correlate alerts from this rule with network logs to identify the destination IP addresses and domains contacted by the compromised container.</li>
<li>Baseline trusted images and exclude stable image digests or namespaces when noisy to reduce false positives, as suggested in the rule&rsquo;s false positives section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>container</category><category>auditd</category><category>linux</category></item><item><title>Potential Privilege Escalation in Container via Runc Init</title><link>https://feed.craftedsignal.io/briefs/2024-01-runc-privilege-escalation/</link><pubDate>Fri, 05 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-runc-privilege-escalation/</guid><description>Detection of runc init child processes with root effective user and non-root login user ID, indicating potential container privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies a potential privilege escalation vulnerability within container environments utilizing <code>runc</code>, the low-level container runtime used by Docker and containerd. The rule focuses on audit events triggered by <code>runc init</code> child processes. Specifically, it flags instances where the effective user ID is root (0), while the login user ID is not root. This discrepancy can indicate malicious activity, such as exploiting credential separation or namespace transitions to gain unauthorized root privileges within the container or escape to the host. This is relevant for defenders because a compromised container can lead to host compromise, data exfiltration, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a container with limited privileges.</li>
<li>The attacker exploits a vulnerability within the container to execute code as the <code>runc init</code> process.</li>
<li>The <code>runc init</code> process spawns a child process while retaining a non-root user ID in audit telemetry.</li>
<li>The child process is assigned an effective user ID of 0 (root), bypassing normal permission controls.</li>
<li>The attacker leverages the elevated privileges to modify sensitive files or execute commands as root within the container&rsquo;s namespace.</li>
<li>The attacker may then attempt to escape the container by exploiting kernel vulnerabilities or misconfigurations to gain access to the host system.</li>
<li>Upon gaining access to the host system, the attacker can install malware, steal sensitive data, or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful privilege escalation attack within a container environment can lead to complete compromise of the container and potentially the host system. This can result in data breaches, service disruptions, and unauthorized access to sensitive resources. The impact is significant because a single compromised container can become a launchpad for attacks against other containers or the underlying infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Privilege Escalation via Runc Init&rdquo; to your SIEM to detect suspicious <code>runc init</code> process executions.</li>
<li>Enable Linux audit logging via the Auditd Manager integration, ensuring that <code>execve</code> and identity-related fields are captured.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the full audit event details, including process ancestry, user IDs, and container metadata.</li>
<li>Review container configurations and security profiles to identify potential misconfigurations that could facilitate privilege escalation.</li>
<li>Implement network segmentation to limit the blast radius of a compromised container.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>linux</category></item><item><title>Unusual Process Connecting to Docker or Containerd Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</guid><description>An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.</description><content:encoded><![CDATA[<p>This threat involves unauthorized processes connecting directly to container runtime sockets (Docker or Containerd) on Linux systems. This bypasses Kubernetes API server restrictions, potentially allowing attackers to create, execute, or manipulate containers without proper authorization or logging. The risk lies in attackers circumventing RBAC, admission webhooks, and pod security standards. The attack can start when a compromised process attempts to connect to the Docker or Containerd socket, potentially leading to privilege escalation and lateral movement within the containerized environment. This attack is significant because it undermines core security controls within container orchestration platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or compromised process gains initial access to the host system.</li>
<li>The process attempts to connect to the container runtime socket (e.g., <code>/var/run/docker.sock</code> or <code>/run/containerd/containerd.sock</code>).</li>
<li>The process bypasses the Kubernetes API server and associated security controls.</li>
<li>The attacker exploits the direct socket connection to create a new container.</li>
<li>The attacker gains access to sensitive data or resources within the container.</li>
<li>The attacker escalates privileges within the compromised container.</li>
<li>The attacker uses the compromised container to move laterally to other containers or hosts within the environment.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Kubernetes security measures, create unauthorized containers, and potentially gain control over the entire cluster. The observed impact includes privilege escalation, lateral movement, and data exfiltration. The severity of this attack depends on the level of access granted to the compromised container and the sensitivity of the data and resources within the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Auditd Manager to capture network and socket events, specifically monitoring for <code>connect</code> calls to Unix sockets as described in the <a href="https://docs.elastic.co/integrations/auditd_manager">Auditd Manager documentation</a>.</li>
<li>Deploy the Sigma rule &ldquo;Unusual Process Connecting to Docker or Containerd Socket&rdquo; to detect suspicious processes connecting to container runtime sockets, tuning <code>process.executable</code> and <code>user.name</code> for known legitimate processes.</li>
<li>Monitor file permissions on the socket paths (<code>/var/run/docker.sock</code>, <code>/run/docker.sock</code>, <code>/var/run/containerd/containerd.sock</code>, <code>/run/containerd/containerd.sock</code>) and restrict access to trusted groups only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>lateral-movement</category><category>linux</category></item></channel></rss>