T1525 Implant Container Image Mappings

Adversaries may implant cloud container images with malicious code to establish persistence. Amazon Web Service (AWS) Amazon Machine Images (AMI), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019)

A tool has been developed to facilitate planting backdoors in cloud container images.(Citation: Rhino Labs Cloud Backdoor September 2019) If an attacker has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as a Web Shell.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019) Adversaries may also implant Docker images that may be inadvertently used in cloud deployments, which has been reported in some instances of cryptomining botnets.(Citation: ATT Cybersecurity Cryptocurrency Attacks on Cloud)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
AC-2 Account Management Protects T1525 Implant Container Image
AC-3 Access Enforcement Protects T1525 Implant Container Image
AC-5 Separation of Duties Protects T1525 Implant Container Image
AC-6 Least Privilege Protects T1525 Implant Container Image
CA-8 Penetration Testing Protects T1525 Implant Container Image
CM-2 Baseline Configuration Protects T1525 Implant Container Image
CM-5 Access Restrictions for Change Protects T1525 Implant Container Image
CM-6 Configuration Settings Protects T1525 Implant Container Image
CM-7 Least Functionality Protects T1525 Implant Container Image
IA-2 Identification and Authentication (organizational Users) Protects T1525 Implant Container Image
IA-9 Service Identification and Authentication Protects T1525 Implant Container Image
RA-5 Vulnerability Monitoring and Scanning Protects T1525 Implant Container Image
SI-2 Flaw Remediation Protects T1525 Implant Container Image
SI-3 Malicious Code Protection Protects T1525 Implant Container Image
SI-4 System Monitoring Protects T1525 Implant Container Image
SI-7 Software, Firmware, and Information Integrity Protects T1525 Implant Container Image
azure_security_center_recommendations Azure Security Center Recommendations technique_scores T1525 Implant Container Image
Comments
This control's "Container images should be deployed from trusted registries only", "Container registries should not allow unrestricted network access" and "Container registries should use private link" recommendations can lead to ensuring that container images are only loaded from trusted registries thereby mitigating this technique.
References
linux_auditd_alerts_and_log_analytics_agent_integration Linux auditd alerts and Log Analytics agent integration technique_scores T1525 Implant Container Image
Comments
This control may alert on suspicious container images running mining software or SSH servers. Privileged Docker containers and privileged commands running within containers may also be detected. These alerts are only generated on containers in Linux endpoint machines and not for containers running from Azure Docker deployment.
References
azure_defender_for_kubernetes Azure Defender for Kubernetes technique_scores T1525 Implant Container Image
Comments
This control may alert on containers with sensitive volume mounts, unneeded privileges, or running an image with digital currency mining software.
References
azure_policy Azure Policy technique_scores T1525 Implant Container Image
Comments
This control may provide recommendations to enable scanning and auditing of container images. This can provide information on images that have been added with high privileges or vulnerabilities.
References
azure_defender_for_container_registries Azure Defender for Container Registries technique_scores T1525 Implant Container Image
Comments
This control may prevent adversaries from implanting malicious container images through fine grained permissions and use of container image tag signing. Image tag signing allows for verifiable container images that have been signed with legitimate keys.
References
azure_defender_for_container_registries Azure Defender for Container Registries technique_scores T1525 Implant Container Image
Comments
This control may scan and alert on import or creation of container images with known vulnerabilities or a possible expanded surface area for exploitation.
References
docker_host_hardening Docker Host Hardening technique_scores T1525 Implant Container Image
Comments
This control may alert on Docker containers that are misconfigured or do not conform to CIS Docker Benchmarks. This may result in detection of container images implanted within Linux VMs with specific vulnerabilities or misconfigurations for malicious purposes.
References