• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers exploit containerized environments to steals proprietary data and software

Hackers Exploit Containerized Environments to Steals Proprietary Data and Software

You are here: Home / General Cyber Security News / Hackers Exploit Containerized Environments to Steals Proprietary Data and Software
March 2, 2023

A sophisticated attack campaign dubbed SCARLETEEL is concentrating on containerized environments to perpetrate theft of proprietary facts and software.

“The attacker exploited a containerized workload and then leveraged it to accomplish privilege escalation into an AWS account in purchase to steal proprietary computer software and credentials,” Sysdig explained in a new report.

The superior cloud attack also entailed the deployment of crypto miner program, which the cybersecurity enterprise mentioned is either an endeavor to generate illicit gains or a ploy to distract defenders and throw them off the path.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The preliminary an infection vector banked on exploiting a susceptible general public-experiencing assistance in a self-managed Kubernetes cluster hosted on Amazon Web Expert services (AWS).

On attaining a thriving foothold, an XMRig crypto miner was launched and a bash script was utilized to acquire credentials that could be utilised to more burrow into the AWS cloud infrastructure and exfiltrate delicate info.

“Possibly crypto mining was the attacker’s preliminary target and the purpose adjusted as soon as they accessed the victim’s setting, or crypto mining was used as a decoy to evade the detection of information exfiltration,” the business stated.

The intrusion notably also disabled CloudTrail logs to minimize the digital footprint, preventing Sysdig from accessing added proof. In all, it authorized the risk actor to entry additional than 1TB of data, which includes client scripts, troubleshooting tools, and logging documents.

“They also tried to pivot applying a Terraform condition file to other connected AWS accounts to distribute their access during the group,” the company reported. This, even so, proved to be unsuccessful because of to deficiency of permissions.

The results come months after Sysdig also specific one more cryptojacking marketing campaign mounted by the 8220 Gang concerning November 2022 and January 2023 concentrating on exploitable Apache web server and Oracle Weblogic applications.

Discovered this posting exciting? Observe us on Twitter  and LinkedIn to read much more unique content we post.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «Cyber Security News WH Smith Discloses Cyber-Attack, Company Data Theft
Next Post: White House Launches National Cybersecurity Strategy Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Free decryptor released for Conti ransomware variant infecting hundreds of organisations
  • Bitwarden to release fix for four-year-old vulnerability
  • THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
  • New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
  • A New Security Category Addresses Web-borne Threats
  • ICO Reprimands Metropolitan Police for Data Snafu
  • Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
  • Russian Military Preparing New Destructive Attacks: Microsoft
  • Podcast transcript: The changing face of cyber warfare
  • Vishing Campaign Targets Social Security Administration

Copyright © TheCyberSecurity.News, All Rights Reserved.