<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure Kubernetes Service — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/azure-kubernetes-service/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 18:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/azure-kubernetes-service/feed.xml" rel="self" type="application/rss+xml"/><item><title>Azure Kubernetes Events Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-events-deleted/</link><pubDate>Tue, 09 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-events-deleted/</guid><description>Adversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.</description><content:encoded><![CDATA[<p>Attackers targeting Azure Kubernetes Service (AKS) environments may attempt to remove event logs to cover their tracks and hinder forensic investigations. This activity, which involves deleting Kubernetes events, directly impairs a defender&rsquo;s ability to detect malicious behavior within the cluster. By removing evidence of their actions, attackers can prolong their presence within the environment and increase the potential for further compromise. This technique is relevant for defenders monitoring AKS environments for intrusion activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Azure Kubernetes Service (AKS) cluster with sufficient privileges.</li>
<li>The attacker enumerates existing Kubernetes event logs to identify those they wish to remove.</li>
<li>The attacker executes a command to delete specific Kubernetes events using kubectl or the Azure CLI. The API call used for the deletion is MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE.</li>
<li>The Azure Activity Logs record the event deletion, which is the source of the detection.</li>
<li>The attacker repeats steps 3-4 to remove additional event logs, further obscuring their activities.</li>
<li>The attacker continues with their primary objective, such as deploying malicious containers, exfiltrating data, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Kubernetes events can significantly hinder incident response efforts. Without access to event logs, defenders may struggle to identify the scope and timeline of an attack, potentially leading to incomplete remediation and prolonged exposure. The impact includes increased dwell time for attackers within the compromised environment, as well as a greater likelihood of successful data breaches or system disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect event deletion activity within AKS environments.</li>
<li>Investigate any detected instances of the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation in Azure Activity Logs, as indicated in the rule definition.</li>
<li>Implement robust RBAC policies within AKS to minimize the number of users and service accounts with permissions to delete Kubernetes events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>kubernetes</category><category>defense-evasion</category></item></channel></rss>