Pod Name Similarity (kubernetes)
Platform | Author | Last Update |
---|---|---|
kubernetes | Leo Tsaousis | 2024-12-02 |
Deploy a backdoor container named to imitate system pods.
System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names. Attackers can use this fact and name their backdoor pods as if they were created by the existing controllers to avoid detection. This can be attempted in the kube-system namespace alongside the other administrative containers.
This test case creates pod imitating kube-proxy within the kube-system namespace, which is however based on a public image.
MITRE IDs
Scope
This test case needs Cluster-wide permissions
Required Permissions
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following query can be used to identify relevant events.