Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Implant Internal Image

Implant Internal Image

Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. UnlikeUpload Malware, this technique focuses on adversaries implanting an image in a registry within a victim’s environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.[1]

A tool has been developed to facilitate planting backdoors in cloud container images.[2] If an adversary has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as aWeb Shell.[1]

ID: T1525
Sub-techniques:  No sub-techniques
Platforms: Containers, IaaS
Contributors: Praetorian; Vishwas Manral, McAfee; Yossi Weizman, Azure Defender Research Team
Version: 2.2
Created: 04 September 2019
Last Modified: 24 October 2025

Mitigations

IDMitigationDescription
M1047 Audit

Periodically check the integrity of images and containers used in cloud deployments to ensure they have not been modified to include malicious software.

M1045 Code Signing

Several cloud service providers support content trust models that require container images be signed by trusted sources.[3][4]

M1026 Privileged Account Management

Limit permissions associated with creating and modifying platform images or containers based on the principle of least privilege.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0334Detection Strategy for T1525 – Implant Internal ImageAN0946

Implantation of malicious code into container images followed by registry push and use in new deployments.

AN0947

Creation or modification of cloud virtual machine images (AMIs, custom images) with persistence mechanisms, followed by infrastructure provisioning that uses these implanted images.

References

×

[8]ページ先頭

©2009-2026 Movatter.jp