<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Docker — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/docker/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/docker/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Unusual Process Connecting to Docker or Containerd Socket</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-container-socket-connection/</guid><description>An unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.</description><content:encoded><![CDATA[<p>This threat involves unauthorized processes connecting directly to container runtime sockets (Docker or Containerd) on Linux systems. This bypasses Kubernetes API server restrictions, potentially allowing attackers to create, execute, or manipulate containers without proper authorization or logging. The risk lies in attackers circumventing RBAC, admission webhooks, and pod security standards. The attack can start when a compromised process attempts to connect to the Docker or Containerd socket, potentially leading to privilege escalation and lateral movement within the containerized environment. This attack is significant because it undermines core security controls within container orchestration platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or compromised process gains initial access to the host system.</li>
<li>The process attempts to connect to the container runtime socket (e.g., <code>/var/run/docker.sock</code> or <code>/run/containerd/containerd.sock</code>).</li>
<li>The process bypasses the Kubernetes API server and associated security controls.</li>
<li>The attacker exploits the direct socket connection to create a new container.</li>
<li>The attacker gains access to sensitive data or resources within the container.</li>
<li>The attacker escalates privileges within the compromised container.</li>
<li>The attacker uses the compromised container to move laterally to other containers or hosts within the environment.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Kubernetes security measures, create unauthorized containers, and potentially gain control over the entire cluster. The observed impact includes privilege escalation, lateral movement, and data exfiltration. The severity of this attack depends on the level of access granted to the compromised container and the sensitivity of the data and resources within the cluster.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Auditd Manager to capture network and socket events, specifically monitoring for <code>connect</code> calls to Unix sockets as described in the <a href="https://docs.elastic.co/integrations/auditd_manager">Auditd Manager documentation</a>.</li>
<li>Deploy the Sigma rule &ldquo;Unusual Process Connecting to Docker or Containerd Socket&rdquo; to detect suspicious processes connecting to container runtime sockets, tuning <code>process.executable</code> and <code>user.name</code> for known legitimate processes.</li>
<li>Monitor file permissions on the socket paths (<code>/var/run/docker.sock</code>, <code>/run/docker.sock</code>, <code>/var/run/containerd/containerd.sock</code>, <code>/run/containerd/containerd.sock</code>) and restrict access to trusted groups only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>container</category><category>privilege-escalation</category><category>lateral-movement</category><category>linux</category></item><item><title>Suspicious Process Accessing Sensitive Identity Files via Auditd</title><link>https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sensitive-identity-file-access/</guid><description>This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to sensitive identity files on Linux systems. It leverages Auditd to monitor file access events and flags processes that are commonly used for copying, scripting, or staging files from temporary directories. The targeted files include Kubernetes service account tokens, kubelet configurations, cloud CLI configurations for AWS, Azure, and Google Cloud, root SSH keys, and Docker configurations. These files are critical for authentication and authorization within the system, and unauthorized access could lead to credential theft, privilege escalation, or lateral movement. This is especially important in cloud environments and containerized deployments where these files are commonly used for managing access to resources. The rule is designed to exclude user home paths to avoid false positives and focus on system-level access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system through various means, such as exploiting a vulnerability or compromising credentials.</li>
<li>The attacker uses a utility like <code>cp</code>, <code>cat</code>, or <code>curl</code> to access sensitive files such as <code>/var/run/secrets/kubernetes.io/serviceaccount/token</code> or <code>/root/.ssh/id_rsa</code>.</li>
<li>Auditd logs the file access event, capturing details about the process, user, and file path.</li>
<li>The detection rule identifies the suspicious process based on its name, executable path (e.g., <code>/tmp/*</code>), or command-line arguments.</li>
<li>The rule checks if the accessed file is in the list of sensitive identity files.</li>
<li>If both conditions are met, the rule triggers an alert, indicating potential unauthorized access to sensitive credentials.</li>
<li>The attacker exfiltrates the stolen credentials or uses them to move laterally within the network.</li>
<li>The attacker uses the stolen credentials to access cloud resources or other sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive credentials, allowing attackers to gain unauthorized access to critical systems and data. This can result in data breaches, service disruptions, and financial losses. The targeted files contain credentials for Kubernetes clusters, cloud environments (AWS, Azure, Google Cloud), and SSH keys, potentially impacting a wide range of resources. The impact is particularly severe in environments where these credentials are used for managing critical infrastructure or accessing sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Auditd Manager integration with the specified audit rules in the provided setup steps to monitor access to sensitive identity files on Linux systems. Ensure auditd is properly configured and running (<code>auditctl -l</code>) to generate the necessary logs.</li>
<li>Deploy the Sigma rules provided to detect suspicious processes accessing sensitive identity files and tune them for your environment by excluding legitimate processes or users as needed.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the process name, executable, parent command line, and the accessed file path to determine the legitimacy of the access.</li>
<li>Review and harden file permissions on shared credential stores to prevent unauthorized access. Rotate exposed keys and tokens and invalidate cloud sessions if a compromise is suspected, as suggested in the rule&rsquo;s documentation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>linux</category><category>auditd</category></item><item><title>Ingress Transfer via Windows BITS</title><link>https://feed.craftedsignal.io/briefs/2024-01-bits-ingress-transfer/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bits-ingress-transfer/</guid><description>Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.</description><content:encoded><![CDATA[<p>The Windows Background Intelligent Transfer Service (BITS) is a legitimate Windows service that allows for prioritized, asynchronous, and throttled transfer of files between a client and a server. Adversaries abuse BITS to download malicious payloads while evading typical security protections, as file transfers occur in the context of the <code>svchost.exe</code> process. This activity can obscure the origin of the download and bypass application whitelisting rules. This detection focuses on identifying file rename events where <code>svchost.exe</code> renames temporary BITS files (BIT*.tmp) to executable or archive file types, indicating a potential malicious download via BITS. This technique is commonly employed to deliver malware, exfiltrate data, or download additional tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a script or command-line interface (e.g., PowerShell) to create a BITS job.</li>
<li>The BITS job is configured to download a malicious executable or archive from a remote server using the <code>bitsadmin.exe</code> utility.</li>
<li>BITS downloads the file to a temporary location on the system with a <code>BIT*.tmp</code> extension.</li>
<li>The <code>svchost.exe</code> process renames the temporary file to its final name and extension (e.g., .exe, .zip).</li>
<li>The attacker executes the downloaded file, initiating further malicious activities.</li>
<li>The malware establishes persistence through registry keys or scheduled tasks.</li>
<li>The malware communicates with a command and control (C2) server to receive instructions and exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to download and execute arbitrary code on compromised systems. The use of BITS can bypass traditional security measures, leading to malware infections, data theft, and potentially full system compromise. This technique can be used in conjunction with other attack vectors to establish a persistent foothold within the network. While the rule itself triggers at low severity, the identified activity can be an early warning of more severe attack stages.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Ingress Transfer via Windows BITS&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation and process creation logging to enhance visibility into BITS-related activities.</li>
<li>Monitor network connections initiated by <code>svchost.exe</code> to identify potentially malicious downloads.</li>
<li>Investigate any instances of <code>bitsadmin.exe</code> being executed, especially with command-line arguments indicative of suspicious downloads.</li>
<li>Review <code>Microsoft-Windows-Bits-Client/Operational</code> Windows logs (event ID 59) for unusual BITS events.</li>
<li>Block known malicious domains or IP addresses associated with BITS-related attacks at the firewall or DNS resolver.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>bits</category><category>ingress-transfer</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item></channel></rss>