Files
sigma-rules/hunting/macos/docs/execution_suspicious_file_access_via_docker.md
T
Terrance DeJesus bbfc026c95 [New Hunt] New Hunting Queries for DPRK ByBit (#4644)
* new hunting queries for macOS DPRK

* added docker hunting queries
2025-04-23 16:41:23 -04:00

1.7 KiB

Sensitive File Access via Docker


Metadata

  • Author: Elastic

  • Description: Detects Docker or Docker Desktop processes accessing potentially sensitive host files, including SSH keys, cloud provider credentials, browser data, or crypto wallet files. This behavior may indicate container escape attempts, data harvesting from the host, or misconfigured volume mounts exposing secrets.

  • UUID: fb136106-207c-11f0-aa05-f661ea17fbcd

  • Integration: endpoint

  • Language: [EQL]

  • Source File: Sensitive File Access via Docker

Query

file where event.action == "open" and
  (process.name in ("docker", "Docker Desktop") or process.name like "com.docker*") and
  not file.name in ("System.keychain", "login.keychain-db")

Notes

  • Docker processes accessing sensitive host files may suggest attempts to harvest credentials from the host system.
  • You may enrich this detection by adding file paths for .aws/credentials, .ssh/id_rsa, keychain, or Cookies.
  • Consider filtering legitimate developer use cases or adjusting for specific containers if needed.

MITRE ATT&CK Techniques

References

License

  • Elastic License v2