Skip to content

Commit 523ddb4

Browse files
authored
Update execution_suspicious_pod_or_container_creation_command_execution.toml
1 parent 6990373 commit 523ddb4

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

rules/linux/execution_suspicious_pod_or_container_creation_command_execution.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ updated_date = "2025/12/01"
88
author = ["Elastic"]
99
description = """
1010
This rule detects the creation of pods or containers that execute suspicious commands often associated with persistence or
11-
privilege escalation techniques. Attackers may use container orchestration tools like Kubernetes ("kubectl") or container
12-
runtimes like Docker ("docker") to create pods or containers that run shell commands (e.g., "bash", "sh", "zsh") with
13-
arguments that indicate attempts to establish persistence (e.g., modifying startup scripts, creating backdoors).
11+
privilege escalation techniques. Attackers may use container orchestration tools like kubectl or container runtimes like
12+
docker to create pods or containers that run shell commands with arguments that indicate attempts to establish persistence
13+
(e.g., modifying startup scripts, creating backdoors).
1414
"""
1515
from = "now-9m"
1616
index = [

0 commit comments

Comments
 (0)