MITRE ATT&CK Technique
Defense Evasion T1610
Description

Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. In Kubernetes environments, an adversary may attempt to deploy a privileged or vulnerable container into a specific node in order to [Escape to Host](https://attack.mitre.org/techniques/T1611) and access other containers running on the node. (Citation: AppSecco Kubernetes Namespace Breakout 2020) Containers can be deployed by various means, such as via Docker's <code>create</code> and <code>start</code> APIs or via a web application such as the Kubernetes dashboard or Kubeflow. (Citation: Docker Containers API)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In Kubernetes environments, containers may be deployed through workloads such as ReplicaSets or DaemonSets, which can allow containers to be deployed across multiple nodes.(Citation: Kubernetes Workload Management) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)

Supported Platforms
Containers
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2021-03-29T16:51:26.020Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may deploy a container into an environment to '
                'facilitate execution or evade defenses. In some cases, '
                'adversaries may deploy a new container to execute processes '
                'associated with a particular image or deployment, such as '
                'processes that execute or download malware. In others, an '
                'adversary may deploy a new container configured without '
                'network rules, user limitations, etc. to bypass existing '
                'defenses within the environment. In Kubernetes environments, '
                'an adversary may attempt to deploy a privileged or vulnerable '
                'container into a specific node in order to [Escape to '
                'Host](https://attack.mitre.org/techniques/T1611) and access '
                'other containers running on the node. (Citation: AppSecco '
                'Kubernetes Namespace Breakout 2020)\n'
                '\n'
                'Containers can be deployed by various means, such as via '
                "Docker's <code>create</code> and <code>start</code> APIs or "
                'via a web application such as the Kubernetes dashboard or '
                'Kubeflow. (Citation: Docker Containers API)(Citation: '
                'Kubernetes Dashboard)(Citation: Kubeflow Pipelines) In '
                'Kubernetes environments, containers may be deployed through '
                'workloads such as ReplicaSets or DaemonSets, which can allow '
                'containers to be deployed across multiple nodes.(Citation: '
                'Kubernetes Workload Management) Adversaries may deploy '
                'containers based on retrieved or built malicious images or '
                'from benign images that download and execute malicious '
                'payloads at runtime.(Citation: Aqua Build Images on Hosts)',
 'external_references': [{'external_id': 'T1610',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1610'},
                         {'description': 'Abhisek Datta. (2020, March 18). '
                                         'Kubernetes Namespace Breakout using '
                                         'Insecure Host Path Volume — Part 1. '
                                         'Retrieved January 16, 2024.',
                          'source_name': 'AppSecco Kubernetes Namespace '
                                         'Breakout 2020',
                          'url': 'https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216'},
                         {'description': 'Assaf Morag. (2020, July 15). Threat '
                                         'Alert: Attackers Building Malicious '
                                         'Images on Your Hosts. Retrieved '
                                         'March 29, 2021.',
                          'source_name': 'Aqua Build Images on Hosts',
                          'url': 'https://blog.aquasec.com/malicious-container-image-docker-container-host'},
                         {'description': 'Docker. (n.d.). Docker Engine API '
                                         'v1.41 Reference - Container. '
                                         'Retrieved March 29, 2021.',
                          'source_name': 'Docker Containers API',
                          'url': 'https://docs.docker.com/engine/api/v1.41/#tag/Container'},
                         {'description': 'Kubernetes. (n.d.). Workload '
                                         'Management. Retrieved March 28, '
                                         '2024.',
                          'source_name': 'Kubernetes Workload Management',
                          'url': 'https://kubernetes.io/docs/concepts/workloads/controllers/'},
                         {'description': 'The Kubeflow Authors. (n.d.). '
                                         'Overview of Kubeflow Pipelines. '
                                         'Retrieved March 29, 2021.',
                          'source_name': 'Kubeflow Pipelines',
                          'url': 'https://www.kubeflow.org/docs/components/pipelines/overview/pipelines-overview/'},
                         {'description': 'The Kubernetes Authors. (n.d.). '
                                         'Kubernetes Web UI (Dashboard). '
                                         'Retrieved March 29, 2021.',
                          'source_name': 'Kubernetes Dashboard',
                          'url': 'https://kubernetes.io/docs/tasks/access-application-cluster/web-ui-dashboard/'}],
 'id': 'attack-pattern--56e0d8b8-3e25-49dd-9050-3aa252f5aa92',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'},
                       {'kill_chain_name': 'mitre-attack',
                        'phase_name': 'execution'}],
 'modified': '2025-10-24T17:48:49.017Z',
 'name': 'Deploy Container',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Pawan Kinger, @kingerpawan, Trend Micro',
                          'Alfredo Oliveira, Trend Micro',
                          'Idan Frimark, Cisco',
                          'Center for Threat-Informed Defense (CTID)',
                          'Magno Logan, @magnologan, Trend Micro',
                          'Ariel Shuper, Cisco',
                          'Vishwas Manral, McAfee',
                          'Yossi Weizman, Azure Defender Research Team',
                          'Joas Antonio dos Santos, @C0d3Cr4zy'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': False,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Containers'],
 'x_mitre_version': '1.4'}
Quick Actions
Related Threat Actors (1)
TeamTNT
High