diff --git a/rules/linux/privilege_escalation_docker_release_file_creation.toml b/rules/linux/privilege_escalation_docker_release_file_creation.toml new file mode 100644 index 000000000..e27ead072 --- /dev/null +++ b/rules/linux/privilege_escalation_docker_release_file_creation.toml @@ -0,0 +1,50 @@ +[metadata] +creation_date = "2025/04/25" +integration = ["endpoint"] +maturity = "production" +updated_date = "2025/04/25" + +[rule] +author = ["Elastic"] +description = """ +This rule detects the creation of files named release_agent or notify_on_release, which are +commonly associated with the abuse of Linux cgroup release mechanisms. In Docker or containerized +environments, this behavior may indicate an attempt to exploit privilege escalation vulnerabilities +such as CVE-2022-0492, where attackers use the release_agent feature to execute code on the host +from within a container. +""" +from = "now-9m" +index = ["logs-endpoint.events.file*"] +language = "eql" +license = "Elastic License v2" +name = "Docker Release File Creation" +references = ["https://sysdig.com/blog/detecting-mitigating-cve-2022-0492-sysdig/"] +risk_score = 21 +rule_id = "4d4cda2b-9aad-4702-a0a2-75952bd6a77c" +severity = "low" +tags = [ + "Domain: Endpoint", + "Domain: Container", + "OS: Linux", + "Use Case: Threat Detection", + "Tactic: Privilege Escalation", + "Data Source: Elastic Defend", +] +timestamp_override = "event.ingested" +type = "eql" +query = ''' +file where host.os.type == "linux" and event.type == "creation" and file.name in ("release_agent", "notify_on_release") +''' + +[[rule.threat]] +framework = "MITRE ATT&CK" + +[[rule.threat.technique]] +id = "T1611" +name = "Escape to Host" +reference = "https://attack.mitre.org/techniques/T1611/" + +[rule.threat.tactic] +id = "TA0004" +name = "Privilege Escalation" +reference = "https://attack.mitre.org/tactics/TA0004/"