T1053.007: Container Orchestration Job

Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster.

In Kubernetes, a CronJob may be used to schedule a Job that runs one or more containers to perform specific tasks. An adversary therefore may utilize a CronJob to schedule deployment of a Job that executes malicious code in various nodes within a cluster.

Positive Technologies products that cover the technique

MaxPatrol SIEM knowledge base

Monitoring of process-start events which contain 'kubectl get jobs', 'kubectl create job --from=', 'kubectl apply -f', or 'kubectl create -f' in their command line.

Expert Required. The technique is detected only with the combination of «PT Product + Expert»

Detection

IDDS0032Data source and componentContainer: Container CreationDescription

Monitor for newly constructed containers

IDDS0003Data source and componentScheduled Job: Scheduled Job CreationDescription

Monitor for the anomalous creation of scheduled jobs in container orchestration environments.

IDDS0022Data source and componentFile: File CreationDescription

Monitor for newly constructed files by using the logging agents on Kubernetes nodes and retrieve logs from sidecar proxies for application and resource pods to monitor malicious container orchestration job deployments.

Mitigation

IDM1018NameUser Account ManagementDescription

Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs.

IDM1026NamePrivileged Account ManagementDescription

Ensure containers are not running as root by default. In Kubernetes environments, consider defining Pod Security Standards that prevent pods from running privileged containers.