bbfc026c95
* new hunting queries for macOS DPRK * added docker hunting queries
1.7 KiB
1.7 KiB
Sensitive File Access via Docker
Metadata
-
Author: Elastic
-
Description: Detects Docker or Docker Desktop processes accessing potentially sensitive host files, including SSH keys, cloud provider credentials, browser data, or crypto wallet files. This behavior may indicate container escape attempts, data harvesting from the host, or misconfigured volume mounts exposing secrets.
-
UUID:
fb136106-207c-11f0-aa05-f661ea17fbcd -
Integration: endpoint
-
Language:
[EQL] -
Source File: Sensitive File Access via Docker
Query
file where event.action == "open" and
(process.name in ("docker", "Docker Desktop") or process.name like "com.docker*") and
not file.name in ("System.keychain", "login.keychain-db")
Notes
- Docker processes accessing sensitive host files may suggest attempts to harvest credentials from the host system.
- You may enrich this detection by adding file paths for
.aws/credentials,.ssh/id_rsa,keychain, orCookies. - Consider filtering legitimate developer use cases or adjusting for specific containers if needed.
MITRE ATT&CK Techniques
References
- https://www.elastic.co/security-labs/dprk-code-of-conduct
- https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/
- https://slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34
- https://x.com/safe/status/1897663514975649938
- https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/
License
Elastic License v2