<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auditd_manager — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/auditd_manager/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/auditd_manager/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kubelet API Connection Attempt to Internal IP</title><link>https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-kubelet-api-connection/</guid><description>The rule detects network connection attempts to the Kubernetes Kubelet API ports 10250 and 10255 on internal IP ranges from Linux hosts, indicating potential lateral movement within container and cluster environments.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious network connections to the Kubernetes Kubelet API, specifically targeting ports 10250 and 10255, from Linux hosts within internal network ranges. Attackers frequently exploit weak authentication or network controls to access the Kubelet API, potentially enabling them to enumerate pods, retrieve logs, and execute commands on nodes. This activity often originates from common scripting utilities like <code>curl</code>, <code>wget</code>, or interpreters like <code>python</code> and <code>node</code>, particularly when executed from world-writable directories such as <code>/tmp</code>, <code>/var/tmp</code>, or <code>/dev/shm</code>. This technique is often a component of container and cluster lateral movement, where the attacker seeks to expand their access within the Kubernetes environment. The rule is designed to detect these unauthorized attempts and alert security teams to investigate potential breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised container or host within the Kubernetes cluster, potentially through exploiting a vulnerability in a running application.</li>
<li>The attacker executes a reconnaissance command, such as <code>curl</code> or <code>wget</code>, from within the compromised container, targeting the Kubelet API on port 10250 or 10255.</li>
<li>The <code>curl</code> or <code>wget</code> command is executed from a temporary directory like <code>/tmp</code> or <code>/dev/shm</code> to avoid detection.</li>
<li>The attacker attempts to enumerate running pods and services by querying the <code>/pods</code> or <code>/runningpods</code> endpoints of the Kubelet API.</li>
<li>If successful, the attacker identifies a target pod within the cluster based on the enumerated information.</li>
<li>The attacker leverages the Kubelet API to execute commands within the target pod, potentially escalating privileges or accessing sensitive data.</li>
<li>The attacker attempts to move laterally to other nodes or containers within the Kubernetes cluster, repeating the reconnaissance and exploitation steps.</li>
<li>The ultimate goal is to gain control over the entire Kubernetes cluster, enabling data exfiltration, resource hijacking, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the Kubelet API can lead to a complete compromise of the Kubernetes cluster. Attackers can gain unauthorized access to sensitive data, escalate privileges, and disrupt critical services. While the number of victims may vary depending on the organization&rsquo;s security posture, a successful attack could impact all applications and data managed by the cluster. Organizations in any sector utilizing Kubernetes are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable syscall auditing and ensure that <code>event.category:network</code> events are generated for network connections, as outlined in the rule&rsquo;s setup guide.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune it based on your environment to reduce false positives.</li>
<li>Restrict pod-to-node access to port 10250 using network policies or security groups to limit the attack surface, as noted in the rule&rsquo;s documentation.</li>
<li>Implement Kubernetes API audit logging to detect unauthorized access attempts and credential access, correlating with process argument telemetry as mentioned in the triage steps.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>kubernetes</category><category>lateral-movement</category><category>kubelet</category><category>linux</category><category>container</category></item></channel></rss>