EKS Runtime Monitoring finding types
Amazon GuardDuty generates the following EKS Runtime Monitoring findings to indicate potential threats based on the operating system-level behavior from EC2 hosts and containers in your Amazon EKS clusters.
Note
Runtime Monitoring finding types are based on the runtime logs collected from hosts. The logs contain fields such as file paths that may be controlled by a malicious actor. These fields are also included in GuardDuty findings to provide runtime context. When processing Runtime Monitoring findings outside of GuardDuty console, you must sanitize finding fields. For example, you can HTML encode finding fields when displaying them on a webpage.
Topics
- CryptoCurrency:Runtime/BitcoinTool.B
- Backdoor:Runtime/C&CActivity.B
- UnauthorizedAccess:Runtime/TorRelay
- UnauthorizedAccess:Runtime/TorClient
- Trojan:Runtime/BlackholeTraffic
- Trojan:Runtime/DropPoint
- CryptoCurrency:Runtime/BitcoinTool.B!DNS
- Backdoor:Runtime/C&CActivity.B!DNS
- Trojan:Runtime/BlackholeTraffic!DNS
- Trojan:Runtime/DropPoint!DNS
- Trojan:Runtime/DGADomainRequest.C!DNS
- Trojan:Runtime/DriveBySourceTraffic!DNS
- Trojan:Runtime/PhishingDomainRequest!DNS
- Impact:Runtime/AbusedDomainRequest.Reputation
- Impact:Runtime/BitcoinDomainRequest.Reputation
- Impact:Runtime/MaliciousDomainRequest.Reputation
- Impact:Runtime/SuspiciousDomainRequest.Reputation
- UnauthorizedAccess:Runtime/MetadataDNSRebind
- Execution:Runtime/NewBinaryExecuted
- PrivilegeEscalation:Runtime/DockerSocketAccessed
- PrivilegeEscalation:Runtime/RuncContainerEscape
- PrivilegeEscalation:Runtime/CGroupsReleaseAgentModified
- DefenseEvasion:Runtime/ProcessInjection.Proc
- DefenseEvasion:Runtime/ProcessInjection.Ptrace
- DefenseEvasion:Runtime/ProcessInjection.VirtualMemoryWrite
- Execution:Runtime/ReverseShell
- DefenseEvasion:Runtime/FilelessExecution
- Impact:Runtime/CryptoMinerExecuted
- Execution:Runtime/NewLibraryLoaded
- PrivilegeEscalation:Runtime/ContainerMountsHostDirectory
- PrivilegeEscalation:Runtime/UserfaultfdUsage
CryptoCurrency:Runtime/BitcoinTool.B
An Amazon EC2 instance or a container is querying an IP address that is associated with a cryptocurrency-related activity.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or a container in your AWS environment is querying an IP Address that is associated with a cryptocurrency-related activity. Threat actors may seek to take control over compute resources to maliciously repurpose them for unauthorized cryptocurrency mining.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If you use this EC2 instance or a container to mine or manage cryptocurrency, or either of
these is otherwise involved in blockchain activity, the
CryptoCurrency:Runtime/BitcoinTool.B finding could represent expected activity
for your environment. If this is the case in your AWS environment, we recommend that you set
up a suppression rule for this finding. The suppression rule should consist of two filter
criteria. The first filter criterion should use the Finding
type attribute with a value of CryptoCurrency:Runtime/BitcoinTool.B
.
The second filter criterion should be the Instance ID of the instance or
the Container Image ID of the container involved in cryptocurrency or
blockchain-related activity. For more information, see Suppression rules.
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Backdoor:Runtime/C&CActivity.B
An Amazon EC2 instance or a container is querying an IP that is associated with a known command and control server.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or a container within your AWS environment is querying an IP associated with a known command and control (C&C) server. The listed instance or container might be potentially compromised. Command and control servers are computers that issue commands to members of a botnet.
A botnet is a collection of internet-connected devices that might include PCs, servers, mobile devices, and Internet of Things devices, that are infected and controlled by a common type of malware. Botnets are often used to distribute malware and gather misappropriated information, such as credit card numbers. Depending on the purpose and structure of the botnet, the C&C server might also issue commands to begin a distributed denial of service (DDoS) attack.
Note
If the IP queried is log4j-related, then the fields of the associated finding will include the following values:
-
service.additionalInfo.threatListName = Amazon
-
service.additionalInfo.threatName = Log4j Related
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
UnauthorizedAccess:Runtime/TorRelay
Your Amazon EC2 instance or a container is making connections to a Tor network as a Tor relay.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that an EC2 instance or a container in your AWS environment is making connections to a Tor network in a manner that suggests that it's acting as a Tor relay. Tor is software for enabling anonymous communication. Tor increases anonymity of communication by forwarding the client's possibly illicit traffic from one Tor relay to another.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
UnauthorizedAccess:Runtime/TorClient
Your Amazon EC2 instance or a container is making connections to a Tor Guard or an Authority node.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that an EC2 instance or a container in your AWS environment is making connections to a Tor Guard or an Authority node. Tor is software for enabling anonymous communication. Tor Guards and Authority nodes act as initial gateways into a Tor network. This traffic can indicate that this EC2 instance or the container has been potentially compromised and is acting as a client on a Tor network. This finding may indicate unauthorized access to your AWS resources with the intent of hiding the attacker's true identity.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/BlackholeTraffic
An Amazon EC2 instance or a container is attempting to communicate with an IP address of a remote host that is a known black hole.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you the listed EC2 instance or a container in your AWS environment might be compromised because it is trying to communicate with an IP address of a black hole (or sink hole). Black holes are places in the network where incoming or outgoing traffic is silently discarded without informing the source that the data didn't reach its intended recipient. A black hole IP address specifies a host machine that is not running or an address to which no host has been assigned.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/DropPoint
An Amazon EC2 instance or a container is attempting to communicate with an IP address of a remote host that is known to hold credentials and other stolen data captured by malware.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you that an EC2 instance or a container in your AWS environment is trying to communicate with an IP address of a remote host that is known to hold credentials and other stolen data captured by malware.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
CryptoCurrency:Runtime/BitcoinTool.B!DNS
An Amazon EC2 instance or a container is querying a domain name that is associated with a cryptocurrency activity.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or a container in your AWS environment is querying a domain name that is associated with Bitcoin or other cryptocurrency-related activity. Threat actors may seek to take control over the compute resources in order to maliciously repurpose them for unauthorized cryptocurrency mining.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If you use this EC2 instance or container to mine or manage cryptocurrency, or either of
these is otherwise involved in blockchain activity, the
CryptoCurrency:Runtime/BitcoinTool.B!DNS finding could be an expected activity
for your environment. If this is the case in your AWS environment, we recommend that you set
up a suppression rule for this finding. The suppression rule should consist of two filter
criterion. The first criteria should use the Finding type
attribute with a value of CryptoCurrency:Runtime/BitcoinTool.B!DNS
. The second
filter criteria should be the Instance ID of the instance or the
Container Image ID of the container involved in cryptocurrency or
blockchain activity. For more information, see Suppression Rules.
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Backdoor:Runtime/C&CActivity.B!DNS
An Amazon EC2 instance or a container is querying a domain name that is associated with a known command and control server.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container within your AWS environment is querying a domain name associated with a known command and control (C&C) server. The listed EC2 instance or the container might be compromised. Command and control servers are computers that issue commands to members of a botnet.
A botnet is a collection of internet-connected devices which might include PCs, servers, mobile devices, and Internet of Things devices, that are infected and controlled by a common type of malware. Botnets are often used to distribute malware and gather misappropriated information, such as credit card numbers. Depending on the purpose and structure of the botnet, the C&C server might also issue commands to begin a distributed denial of service (DDoS) attack.
Note
If the domain name queried is log4j-related, then the fields of the associated finding will include the following values:
-
service.additionalInfo.threatListName = Amazon
-
service.additionalInfo.threatName = Log4j Related
Note
To test how GuardDuty generates this finding type, you can make a DNS request from your
instance (using dig
for Linux or nslookup
for Windows) against a
test domain guarddutyc2activityb.com
.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/BlackholeTraffic!DNS
An Amazon EC2 instance or a container is querying a domain name that is being redirected to a black hole IP address.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you the listed EC2 instance or the container in your AWS environment might be compromised because it is querying a domain name that is being redirected to a black hole IP address. Black holes are places in the network where incoming or outgoing traffic is silently discarded without informing the source that the data didn't reach its intended recipient.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/DropPoint!DNS
An Amazon EC2 instance or a container is querying a domain name of a remote host that is known to hold credentials and other stolen data captured by malware.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you that an EC2 instance or a container in your AWS environment is querying a domain name of a remote host that is known to hold credentials and other stolen data captured by malware.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/DGADomainRequest.C!DNS
An Amazon EC2 instance or a container is querying algorithmically generated domains. Such domains are commonly used by malware and could be an indication of a compromised EC2 instance or a container.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container in your AWS environment is trying to query domain generation algorithm (DGA) domains. Your resource might have been compromised.
DGAs are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control (C&C) servers. Command and control servers are computers that issue commands to members of a botnet, which is a collection of internet-connected devices that are infected and controlled by a common type of malware. The large number of potential rendezvous points makes it difficult to effectively shut down botnets because infected computers attempt to contact some of these domain names every day to receive updates or commands.
Note
This finding is based on known DGA domains from GuardDuty threat intelligence feeds.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/DriveBySourceTraffic!DNS
An Amazon EC2 instance or a container is querying a domain name of a remote host that is a known source of Drive-By download attacks.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container in your AWS environment might be compromised because it is querying a domain name of a remote host that is a known source of drive-by download attacks. These are unintended downloads of computer software from the internet that can initiate an automatic installation of a virus, spyware, or malware.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Trojan:Runtime/PhishingDomainRequest!DNS
An Amazon EC2 instance or a container is querying domains involved in phishing attacks.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that there is an EC2 instance or a container in your AWS environment that is trying to query a domain involved in phishing attacks. Phishing domains are set up by someone posing as a legitimate institution in order to induce individuals to provide sensitive data, such as personally identifiable information, banking and credit card details, and passwords. Your EC2 instance or the container might be trying to retrieve sensitive data stored on a phishing website, or it may be attempting to set up a phishing website. Your EC2 instance or the container might be compromised.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Impact:Runtime/AbusedDomainRequest.Reputation
An Amazon EC2 instance or a container is querying a low reputation domain name that is associated with known abused domains.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container within your AWS environment is querying a low reputation domain name associated with known abused domains or IP addresses. Examples of abused domains are top level domain names (TLDs) and second-level domain names (2LDs) providing free subdomain registrations as well as dynamic DNS providers. Threat actors tend to use these services to register domains for free or at low costs. Low reputation domains in this category may also be expired domains resolving to a registrar's parking IP address and therefore may no longer be active. A parking IP is where a registrar directs traffic for domains that have not been linked to any service. The listed Amazon EC2 instance or the container may be compromised as threat actors commonly use these registrar's or services for C&C and malware distribution.
Low reputation domains are based on a reputation score model. This model evaluates and ranks the characteristics of a domain to determine its likelihood of being malicious.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Impact:Runtime/BitcoinDomainRequest.Reputation
An Amazon EC2 instance or a container is querying a low reputation domain name that is associated with cryptocurrency-related activity.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container within your AWS environment is querying a low reputation domain name associated with Bitcoin or other cryptocurrency-related activity. Threat actors may seek to take control over compute resources to maliciously repurpose them for unauthorized cryptocurrency mining.
Low reputation domains are based on a reputation score model. This model evaluates and ranks the characteristics of a domain to determine its likelihood of being malicious.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If you use this EC2 instance or the container to mine or manage cryptocurrency, or if
these resources are otherwise involved in blockchain activity, this finding could represent
expected activity for your environment. If this is the case in your AWS environment, we
recommend that you set up a suppression rule for this finding. The suppression rule should
consist of two filter criteria. The first filter criterion should use the Finding type attribute with a value of
Impact:Runtime/BitcoinDomainRequest.Reputation
. The second filter criterion
should be the Instance ID of the instance or the Container Image
ID of the container is involved in cryptocurrency or blockchain–related
activity. For more information, see Suppression rules.
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Impact:Runtime/MaliciousDomainRequest.Reputation
An Amazon EC2 instance or a container is querying a low reputation domain that is associated with known malicious domains.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container within your AWS environment is querying a low reputation domain name associated with known malicious domains or IP addresses. For example, domains may be associated with a known sinkhole IP address. Sinkholed domains are domains that were previously controlled by a threat actor, and requests made to them can indicate the instance is compromised. These domains may also be correlated with known malicious campaigns or domain generation algorithms.
Low reputation domains are based on a reputation score model. This model evaluates and ranks the characteristics of a domain to determine its likelihood of being malicious.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Impact:Runtime/SuspiciousDomainRequest.Reputation
An Amazon EC2 instance or a container is querying a low reputation domain name that is suspicious in nature due to its age, or low popularity.
Default severity: Low
-
Feature: Runtime Monitoring
This finding informs you that the listed EC2 instance or the container within your AWS environment is querying a low reputation domain name that is suspected of being malicious. noticed characteristics of this domain that were consistent with previously observed malicious domains, however, our reputation model was unable to definitively relate it to a known threat. These domains are typically newly observed or receive a low amount of traffic.
Low reputation domains are based on a reputation score model. This model evaluates and ranks the characteristics of a domain to determine its likelihood of being malicious.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
UnauthorizedAccess:Runtime/MetadataDNSRebind
An Amazon EC2 instance or a container is performing DNS lookups that resolve to the instance metadata service.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that an EC2 instance or a container in your AWS environment is querying a domain that resolves to the EC2 metadata IP address (169.254.169.254). A DNS query of this kind may indicate that the instance is a target of a DNS rebinding technique. This technique can be used to obtain metadata from an EC2 instance, including the IAM credentials associated with the instance.
DNS rebinding involves tricking an application running on the EC2 instance to load return
data from a URL, where the domain name in the URL resolves to the EC2 metadata IP address
(169.254.169.254
). This causes the application to access EC2 metadata and
possibly make it available to the attacker.
It is possible to access EC2 metadata using DNS rebinding only if the EC2 instance is running a vulnerable application that allows injection of URLs, or if someone accesses the URL in a web browser running on the EC2 instance.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
In response to this finding, you should evaluate if there is a vulnerable application running on the EC2 instance or on the container, or if someone used a browser to access the domain identified in the finding. If the root cause is a vulnerable application, fix the vulnerability. If someone browsed the identified domain, block the domain or prevent users from accessing it. If you determine this finding was related to either case above, Revoke the session associated with the EC2 instance.
Some AWS customers intentionally map the metadata IP address to a domain name on their
authoritative DNS servers. If this is the case in your environment, we recommend that you set
up a suppression rule for this finding. The suppression rule should consist of two filter
criteria. The first filter criterion should use the Finding type attribute
with a value of UnauthorizedAccess:Runtime/MetaDataDNSRebind
. The second filter
criterion should be DNS request domain or the Container Image
ID of the container. The DNS request domain value should match
the domain you have mapped to the metadata IP address (169.254.169.254
). For
information about creating suppression rules, see Suppression rules.
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Execution:Runtime/NewBinaryExecuted
A newly created or recently modified binary file in a container has been executed.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you that a newly created or a recently modified binary file in a container was executed. It is the best practice to keep containers immutable at runtime, and binary files, scripts, or libraries should not be created or modified during the lifetime of the container. It is highly suspicious that the newly created binaries were executed in the container environment. This behavior is indicative of a malicious actor that has gained access to the workload, and has downloaded and executed malware or other software as part of the potential compromise.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
PrivilegeEscalation:Runtime/DockerSocketAccessed
A process inside a container is communicating with Docker daemon using Docker socket.
Default severity: Medium
-
Feature: Runtime Monitoring
The Docker socket is a Unix Domain Socket that Docker daemon (dockerd
) uses
to communicate with its clients. A client can perform various actions, such as creating
containers by communicating with Docker daemon through the Docker socket. It is suspicious for
a container process to access the Docker socket. A container process can escape the container
and get a host-level access by communicating with the Docket socket and creating a privileged
container.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
PrivilegeEscalation:Runtime/RuncContainerEscape
An attempt to gain host access of a container was detected.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that the host runC binary file has been potentially overwritten.
runC is the low-level container runtime that high-level container runtimes, such as Docker and
Containerd, use to spawn and run containers. runC is always executed with root privileges
because it needs to perform a low-level task of creating a container. A well-known
vulnerability (CVE-2019-5736
Detail
This finding may also indicate that a malicious actor has potentially executed a command in one of the following two types of containers:
-
A new container with an attacker-controlled image.
-
An existing container that was previously accessible to the attacker with write permissions.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
PrivilegeEscalation:Runtime/CGroupsReleaseAgentModified
A container escape through runC was detected in an Amazon EKS cluster.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that an attempt to modify a control group (cgroup) release agent
file has been detected. Linux uses control groups (cgroups) to limit, account for, and isolate
the resource usage of a collection of processes. Each cgroup has a release agent file
(release_agent
), a script that Linux executes when any process inside the cgroup
terminates. The release agent file is always executed at the host level. A threat actor inside
a container can escape to the host by writing arbitrary commands to the release agent file that
belongs to a cgroup. When a process inside that cgroup terminates, the commands written by the
actor get executed.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
DefenseEvasion:Runtime/ProcessInjection.Proc
A process injection using proc filesystem was detected in a container or an Amazon EC2 instance.
Default severity: High
-
Feature: Runtime Monitoring
Process
injection is a technique that threat actors use to inject code into
processes to evade defenses and potentially elevate privileges. The proc filesystem (procfs) is
a special filesystem in Linux that presents the virtual memory of process as a file. The path
of that file is /proc/PID/mem
, where PID
is the unique ID of the
process. A threat actor can write to this file to inject code into the process. This finding
identifies potential attempts to write to this file.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource type might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
DefenseEvasion:Runtime/ProcessInjection.Ptrace
A process injection using ptrace system call was detected in a container or an Amazon EC2 instance.
Default severity: Medium
-
Feature: Runtime Monitoring
Process injection is a technique that threat actors use to inject code into processes to evade defenses and potentially elevate privileges. A process can use ptrace system call to inject code into another process. This finding identifies a potential attempt to inject code into a process using the ptrace system call.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource type might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
DefenseEvasion:Runtime/ProcessInjection.VirtualMemoryWrite
A process injection through a direct write to virtual memory was detected in a container or an Amazon EC2 instance.
Default severity: High
-
Feature: Runtime Monitoring
Process
injection is a technique that threat actors use to inject code into
processes to evade defenses and potentially elevate privileges. A process can use a system
call such as process_vm_writev
to directly inject code into another
process's virtual memory. This finding identifies a potential attempt to inject code into a
process using a system call for writing to the virtual memory of the process.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource type might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Execution:Runtime/ReverseShell
A process in a container or an Amazon EC2 instance has created a reverse shell.
Default severity: High
-
Feature: Runtime Monitoring
A reverse shell is a shell session created on a connection that is initiated from the target host to the actor's host. This is opposite to a normal shell that is initiated from the actor's host to the target's host. Threat actors create a reverse shell to execute commands on the target after gaining initial access to the target. This finding identifies a potential attempt to create a reverse shell.
Remediation recommendations:
If this activity is unexpected, your resource type might have been compromised.
DefenseEvasion:Runtime/FilelessExecution
A process in a container or an Amazon EC2 instance is executing code from memory.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you when a process is executed using an in-memory executable file on disk. This is a common defense evasion technique that avoids writing the malicious executable to the disk to evade file system scanning-based detection. Although this technique is used by malware, it also has some legitimate use cases. One of the examples is a just-in-time (JIT) compiler that writes compiled code to memory and executes it from memory.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
Impact:Runtime/CryptoMinerExecuted
A container or an Amazon EC2 instance is executing a binary file that is associated with a cryptocurrency mining activity.
Default severity: High
-
Feature: Runtime Monitoring
This finding informs you that a container or an EC2 instance in your AWS environment is executing a binary file that is associated with a cryptocurrency mining activity. Threat actors may seek to take control over compute resources to maliciously repurpose them for unauthorized cryptocurrency mining.
The runtime agent monitors events from multiple resource types. To identify the potentially compromised resource, view Resource type in the findings panel in the GuardDuty console.
Remediation recommendations:
The runtime agent monitors events from multiple resources. To identify the affected resource, view Resource type in the findings details in the GuardDuty console and see Remediating EKS Runtime Monitoring findings.
Execution:Runtime/NewLibraryLoaded
A newly created or recently modified library was loaded by a process inside a container.
Default severity: Medium
-
Feature: Runtime Monitoring
This finding informs you that a library was created or modified inside a container during runtime and loaded by a process running inside the container. The best practice is to keep the containers immutable at the runtime, and not to create or modify the binary files, scripts, or libraries during the lifetime of the container. Loading of a newly created or modified library in a container may indicate suspicious activity. This behavior indicates that a malicious actor has potentially gained access to the container, has downloaded, and executed malware or other software as a part of the potential compromise.
The runtime agent monitors events from multiple resources. To identify the affected resource, view Resource type in the findings details in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
PrivilegeEscalation:Runtime/ContainerMountsHostDirectory
A process inside a container mounted a host filesystem at runtime.
Default severity: Medium
-
Feature: Runtime Monitoring
Multiple container escape techniques involve mounting a host filesystem inside a container at runtime. This finding informs you that a process inside a container potentially attempted to mount a host filesystem, which may indicate an attempt to escape to the host.
The runtime agent monitors events from multiple resources. To identify the affected resource, view Resource type in the findings details in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.
PrivilegeEscalation:Runtime/UserfaultfdUsage
A process
used userfaultfd
system calls to handle page faults in user space.
Default severity: Medium
-
Feature: Runtime Monitoring
Typically, page faults are handled by the kernel in kernel space. However,
userfaultfd
system call allows a process to handle page faults on a filesystem in
user space. This is a useful feature that enables implementation of user-space filesystems. On
the other hand, it can also be used by a potentially malicious process to interrupt kernel from
user space. Interrupting kernel by using userfaultfd
system call is a common
exploitation technique to extend race windows during exploitation of kernel race conditions.
Use of userfaultfd
may indicate suspicious activity on the Amazon Elastic Compute Cloud (Amazon EC2)
instance.
The runtime agent monitors events from multiple resources. To identify the affected resource, view Resource type in the findings details in the GuardDuty console.
Remediation recommendations:
If this activity is unexpected, your resource might have been compromised. For more information, see Remediating EKS Runtime Monitoring findings.