Execution

T1204.003: Malicious Image

Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well a...

T1204.003 · Sub-technique ·2 platforms ·1 groups

Description

Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via Upload Malware, and users may then download and deploy an instance or container from the image without realizing the image is malicious, thus bypassing techniques that specifically achieve Initial Access. This can lead to the execution of malicious code, such as code that executes cryptocurrency mining, in the instance or container.(Citation: Summit Route Malicious AMIs)

Adversaries may also name images a certain way to increase the chance of users mistakenly deploying an instance or container from the image (ex: Match Legitimate Resource Name or Location).(Citation: Aqua Security Cloud Native Threat Report June 2021)

Platforms

IaaSContainers

Mitigations (4)

Code SigningM1045

Utilize a trust model such as Docker Content Trust with digital signatures to ensure runtime verification of the integrity and publisher of specific image tags.(Citation: Content trust in Docker)(Citation: Content trust in Azure Container Registry)

Network Intrusion PreventionM1031

Network prevention intrusion systems and systems designed to scan and remove malicious downloads can be used to block activity.

User TrainingM1017

Train users to be aware of the existence of malicious images and how to avoid deploying instances and containers from them.

AuditM1047

Audit images deployed within the environment to ensure they do not contain any malicious components.

Threat Groups (1)

IDGroupContext
G0139TeamTNT[TeamTNT](https://attack.mitre.org/groups/G0139) has relied on users to download and execute malicious Docker images.(Citation: Lacework TeamTNT May 2...

References

Frequently Asked Questions

What is T1204.003 (Malicious Image)?

T1204.003 is a MITRE ATT&CK technique named 'Malicious Image'. It belongs to the Execution tactic(s). Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well a...

How can T1204.003 be detected?

Detection of T1204.003 (Malicious Image) typically involves monitoring system logs, network traffic, and endpoint telemetry. Use SIEM rules, EDR solutions, and behavioral analytics to identify suspicious activity associated with this technique.

What mitigations exist for T1204.003?

There are 4 documented mitigations for T1204.003. Key mitigations include: Code Signing, Network Intrusion Prevention, User Training, Audit.

Which threat groups use T1204.003?

Known threat groups using T1204.003 include: TeamTNT.