Container Service (T1543.005)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Abhisek Datta. (2020, March 18). Kubernetes Namespace Breakout using Insecure Host Path Volume — Part 1. Retrieved January 16, 2024. AppSecco Kubernetes Namespace Breakout 2020
Docker. (n.d.). Start containers automatically. Retrieved February 15, 2024. Docker Systemd
GTFOBins. (n.d.). docker. Retrieved February 15, 2024. GTFOBins Docker
Kubernetes. (n.d.). Assigning Pods to Nodes. Retrieved February 15, 2024. Kubernetes Assigning Pods to Nodes
Kubernetes. (n.d.). DaemonSet. Retrieved February 15, 2024. Kubernetes DaemonSet
Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023. Aquasec Kubernetes Attack 2023
Ofek Itach and Assaf Morag. (2023, July 13). TeamTNT Reemerged with New Aggressive Cloud Campaign. Retrieved February 15, 2024. AquaSec TeamTNT 2023
Valentin Rothberg. (2022, March 16). How to run pods as systemd services with Podman. Retrieved February 15, 2024. Podman Systemd