<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wiz Runtime Sensor — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/wiz-runtime-sensor/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 14:24:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/wiz-runtime-sensor/feed.xml" rel="self" type="application/rss+xml"/><item><title>Wiz Runtime Sensor Provides Threat Detection for Google Cloud Run Containers</title><link>https://feed.craftedsignal.io/briefs/2026-05-google-cloud-run-runtime-threat-detection/</link><pubDate>Tue, 19 May 2026 14:24:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-google-cloud-run-runtime-threat-detection/</guid><description>Wiz's Runtime Sensor for Google Cloud Run Containers offers real-time threat detection and response for serverless container workloads by monitoring process execution, system calls, and runtime behavior to detect unauthorized activity, correlate events into consolidated threats, and enable automated responses.</description><content:encoded><![CDATA[<p>Wiz has announced the general availability of its Runtime Sensor for Google Cloud Run Containers, providing real-time threat detection and response capabilities for serverless container workloads. Google Cloud Run is a popular platform for deploying containerized applications without managing infrastructure. As Cloud Run adoption increases, security teams face the challenge of detecting threats and malicious activities inside running containers. The Wiz Runtime Sensor provides continuous, real-time visibility into container execution, enabling investigation with the Wiz Blue Agent and automated responses to detected threats. This release complements Wiz&rsquo;s existing agentless security coverage for Cloud Run.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Cloud Run container, potentially through a vulnerability in the application code or a misconfiguration in the container image.</li>
<li>The attacker executes a malicious binary within the container that was not part of the original image.</li>
<li>The attacker initiates a reverse shell connection from the container to an external command-and-control server, establishing a communication channel.</li>
<li>The attacker performs reconnaissance within the container environment, enumerating sensitive data and potential lateral movement opportunities.</li>
<li>The attacker attempts to escalate privileges within the container or the underlying Google Cloud environment by exploiting IAM permissions.</li>
<li>The attacker performs DNS queries to known malicious domains, indicating potential command-and-control or data exfiltration activity.</li>
<li>Wiz Runtime Sensor detects the suspicious activities, correlates the detections into a consolidated threat, and triggers automated response policies.</li>
<li>Automated responses, such as terminating the malicious process or blocking specific runtime behaviors, are enacted to contain the threat.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks on Google Cloud Run containers can lead to unauthorized access to sensitive data, disruption of services, and potential compromise of the underlying Google Cloud environment. If cryptomining is performed, this could trigger multiple detections, including a file associated with a known cryptominer, a DNS query to a known mining pool, a cryptominer command line argument, and reverse shell activity. The damage can range from data breaches and financial losses to reputational damage and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Wiz Runtime Sensor on Google Cloud Run to gain real-time visibility into container execution and enable threat detection and response.</li>
<li>Utilize the 2000+ built-in threat detection rules provided by the Wiz Runtime Sensor, and extend the detection library with custom rules tailored to your environment.</li>
<li>Enable automated response policies within Wiz to automatically terminate malicious processes, block specific runtime behaviors, or trigger workflows in response to detected threats.</li>
<li>Investigate suspicious events flagged by the Wiz Runtime Sensor by using the Wiz Blue Agent for forensics and code analysis.</li>
<li>Monitor DNS queries to block known malicious domains observed via Wiz detections, as detailed in the IOC table.</li>
<li>Enable Sysmon process creation logging to enhance visibility of process execution inside containers and trigger detections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>runtime-security</category><category>threat-detection</category></item></channel></rss>