T1053.007 - Container Orchestration Job#

Adversaries may abuse task scheduling functionality provided by container orchestration tools such as Kubernetes to schedule deployment of containers configured to execute malicious code. Container orchestration jobs run these automated tasks at a specific date and time, similar to cron jobs on a Linux system. Deployments of this type can also be configured to maintain a quantity of containers over time, automating the process of maintaining persistence within a cluster.

In Kubernetes, a CronJob may be used to schedule a Job that runs one or more containers to perform specific tasks.(Citation: Kubernetes Jobs)(Citation: Kubernetes CronJob) An adversary therefore may utilize a CronJob to schedule deployment of a Job that executes malicious code in various nodes within a cluster.(Citation: Threat Matrix for Kubernetes)

Atomic Tests#

Atomic Test #1 - ListCronjobs#

Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. Attackers may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Supported Platforms: containers

Elevation Required (e.g. root or admin)

Dependencies: Run with bash!#

Description: kubectl must be installed#
Check Prereq Commands:#
which kubectl
Get Prereq Commands:#
echo "kubectl must be installed manually"
Invoke-AtomicTest T1053.007 -TestNumbers 1 -GetPreReqs

Attack Commands: Run with bash#

kubectl get cronjobs -n default
Invoke-AtomicTest T1053.007 -TestNumbers 1

Atomic Test #2 - CreateCronjob#

Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. Attackers may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.

Supported Platforms: containers

Elevation Required (e.g. root or admin)

Dependencies: Run with bash!#

Description: kubectl must be installed#
Check Prereq Commands:#
which kubectl
Get Prereq Commands:#
echo "kubectl must be installed manually"
Invoke-AtomicTest T1053.007 -TestNumbers 2 -GetPreReqs

Attack Commands: Run with bash#

kubectl create -f src/cronjob.yaml -n default
Invoke-AtomicTest T1053.007 -TestNumbers 2

Cleanup:#

kubectl delete cronjob art -n default
Invoke-AtomicTest T1053.007 -TestNumbers 2 -Cleanup

Detection#

Monitor for the anomalous creation of scheduled jobs in container orchestration environments. Use logging agents on Kubernetes nodes and retrieve logs from sidecar proxies for application and resource pods to monitor malicious container orchestration job deployments.