๎ ‚April 21, 2023๎ „Rabbi LakshmananKubernetes / cryptocurrency

A large-scale attack campaign discovered in the wild is based on Kubernetes (K8s) role-based access control (RBACMore) to create backdoors and run cryptocurrency miners.

โ€œThe attackers also deployed a DaemonSet to hijack and hijack the resources of the attacking K8s cluster,โ€ said cloud security firm Aqua. report Share with Hacker News.Israeli company that dubbed the attack RBAC Bustersaid it found 60 exposed K8s clusters exploited by the threat actors behind this campaign.

The attack chain begins with the attacker gaining initial access through a misconfigured API server, then checks the compromised server for evidence of competing minor malware, and uses RBAC to persist. set gender.

“The attacker created a new ClusterRole with almost administrator-level privileges,” the company said. “The attacker then created ‘ServiceAccount’, ‘kube-controller’ in the ‘kube-system’ namespace. Finally, the attacker created a ‘ClusterRoleBinding’ and bound the ClusterRole to her ServiceAccount. created a strong, discreet permanence.โ€

In an observed intrusion into a K8s honeypot, attackers weaponized exposed AWS access keys, gained a foothold in environments, stole data, and attempted to escape cluster boundaries.

Kubernetes RBAC

The final step in the attack required the threat actor to create a DaemonSet to deploy a Docker-hosted container image (โ€œkuberntesio/kube-controller:1.0.1โ€) to all nodes. A container that has been pulled by him 14,399 times since it was uploaded five months ago harbors a cryptocurrency miner.

upcoming webinars

Zero Trust + Deception: Learn How to Outsmart Attackers!

See how Deception can detect advanced threats, stop lateral movement, and strengthen your Zero Trust strategy. Join us for an insightful webinar!

Save my seat!

“The container image named ‘kuberntesio/kube-controller’ is an example of typosquatting impersonating a legitimate ‘kubernetesio’ account,” said Aqua. “This image is a key component of the control plane, the popular ‘kube-controller-manager’ container that runs inside his Pods on every master node and is responsible for detecting and responding to node failures. It also mimics the image.”

Interestingly, some of the tactics described in this campaign are similar to another illegal cryptocurrency mining operation that also utilized DaemonSets to create Dero and Monero. It is not clear at this time if the two sets of attacks are related.

Did you find this article interesting?Please follow us twitter โ—‹ and LinkedIn To read more exclusive content that we post.

cropped-BTA_Logo-B-1-scaled-1
YOUR FUTURE STARTS HERE.

BLUE TRAINING ACADEMY

Register now for our membership to gain access to our elite training program and fast forward your career today!

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

cropped-BTA_Logo-B-1-scaled-1
Security Blog

Blue Training Academy

Blue Training Academy was developed in 2018 as a educational and training facility for continuing education and certification courses. Blue Training Academy is an educational institution that allows for all sectors of the public and Criminal Justice field to gain ongoing training and education.

Copyright ยฉ๏ธ All rights reserved. | Blue Training Academy Blog