• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
crypto mining hackers hit kubernetes clusters

Crypto-mining hackers hit Kubernetes clusters

You are here: Home / General Cyber Security News / Crypto-mining hackers hit Kubernetes clusters
June 10, 2021

Security scientists have warned of hackers’ continued attacks from Kubernetes clusters running Kubeflow machine learning (ML) occasions by setting up malicious containers that mine cryptocurrencies, these kinds of as Monero and Ethereum.

In accordance to Microsoft Senior Security Researcher Yossi Weizman, the attacks started at the stop of last thirty day period as he and his staff discovered a spike in TensorFlow device studying pod deployments. An investigation of the entry stage of the pods revealed deployment aimed to mine cryptocurrency.

“The burst of deployments on the various clusters was simultaneous. This signifies that the attackers scanned all those clusters in advance and managed a record of likely targets, which ended up later attacked at the similar time,” said Weizman.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The hackers utilized two pictures in the attack. The initially was the most up-to-date variation of TensorFlow (tensorflow/tensorflow:hottest), and the next was the latest variation with GPU assistance (tensorflow/tensorflow:latest-gpu).

The pictures were respectable but ran malicious crypto-mining code. The attackers abused the entry to the Kubeflow centralized dashboard to develop a new pipeline. Kubeflow Pipelines is a platform for deploying ML pipelines based mostly on Argo Workflow. These dashboards had been uncovered to the internet as a substitute of remaining only open to nearby obtain.

Hackers deployed at minimum two pods on each individual cluster: one particular for CPU mining, and the other for GPU mining. Both equally containers used open-resource miners from GitHub: Ethminer in the circumstance of the GPU container and XMRIG in the CPU 1.

The malicious pods all had the same sample of title “sequential-pipeline-random sample.” 

Weizman stated that as aspect of the attack, hackers deployed a reconnaissance container that queries info about the ecosystem, these as GPU and CPU data, as preparation for the mining action. This also ran from a TensorFlow container.

“The attack is nevertheless lively, and new Kubernetes clusters that operate Kubeflow get compromised,” Weizman added.

The marketing campaign is identical to just one staged in April past yr. This also abused Kubernetes clusters in a crypto-mining marketing campaign. On the other hand, as an alternative of working with Kubeflow Pipelines to deploy ML pipelines, it utilised a Jupyter notebook server. This marketing campaign was the first that Microsoft observed targeting Kubeflow environments.

Weizman reported that corporations managing Kubeflow must guarantee that the centralized dashboard is not insecurely uncovered to the internet. If Kubeflow should be uncovered to the internet, make positive you use authentication. Administrators should really also search containers that operate TensorFlow pictures and examine the entry stage of these containers.


Some parts of this posting are sourced from:
www.itpro.co.uk

Previous Post: «jbs paid $11m to revil gang even after restoring operations JBS Paid $11M to REvil Gang Even After Restoring Operations
Next Post: Steam Gaming Platform Delivering Malware steam gaming platform delivering malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.