O Security Command Center realiza a monitorização de tempo de execução e do plano de controlo dos recursos do Cloud Run. Para ver respostas recomendadas a estas ameaças, consulte o artigo Responda a resultados de ameaças do Cloud Run.
Tipos de descobertas de tempo de execução
As seguintes deteções de tempo de execução estão disponíveis com a Deteção de ameaças do Cloud Run:
Command and Control: Steganography Tool DetectedCommand and Control: Find Google Cloud CredentialsCredential Access: GPG Key ReconnaissanceCredential Access: Search Private Keys or PasswordsDefense Evasion: Base64 ELF File Command LineDefense Evasion: Base64 Encoded Python Script ExecutedDefense Evasion: Base64 Encoded Shell Script ExecutedDefense Evasion: Launch Code Compiler Tool In ContainerExecution: Added Malicious Binary ExecutedExecution: Added Malicious Library LoadedExecution: Built in Malicious Binary ExecutedExecution: Container EscapeExecution: Fileless Execution in /memfd:Execution: Kubernetes Attack Tool ExecutionExecution: Local Reconnaissance Tool ExecutionExecution: Malicious Python executedExecution: Modified Malicious Binary ExecutedExecution: Modified Malicious Library LoadedExecution: Netcat Remote Code Execution in ContainerExecution: Possible Arbitrary Command Execution through CUPS (CVE-2024-47177)Execution: Possible Remote Command Execution DetectedExecution: Program Run with Disallowed HTTP Proxy EnvExecution: Socat Reverse Shell DetectedExecution: Suspicious OpenSSL Shared Object LoadedExfiltration: Launch Remote File Copy Tools in ContainerImpact: Detect Malicious CmdlinesImpact: Remove Bulk Data From DiskImpact: Suspicious crypto mining activity using the Stratum ProtocolMalicious Script ExecutedMalicious URL ObservedPrivilege Escalation: Abuse of Sudo For Privilege Escalation (CVE-2019-14287)Privilege Escalation: Fileless Execution in /dev/shmPrivilege Escalation: Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)Privilege Escalation: Sudo Potential Privilege Escalation (CVE-2021-3156)Reverse ShellUnexpected Child ShellTipos de descobertas do plano de controlo
As seguintes deteções do plano de controlo estão disponíveis com a Deteção de ameaças de eventos:
Execution: Cryptomining Docker ImageImpact: Cryptomining CommandsPrivilege Escalation: Default Compute Engine Service Account SetIAMPolicyO que se segue?
- Saiba mais sobre a deteção de ameaças do Cloud Run.
- Saiba mais sobre a deteção de ameaças de eventos.
- Saiba como responder a resultados de ameaças do Cloud Run.
- Consulte o índice de resultados de ameaças.