• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
kubernetes rbac exploited in large scale campaign for cryptocurrency mining

Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency Mining

You are here: Home / General Cyber Security News / Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency Mining
April 21, 2023

A big-scale attack campaign learned in the wild has been exploiting Kubernetes (K8s) Purpose-Based Obtain Manage (RBAC) to generate backdoors and operate cryptocurrency miners.

“The attackers also deployed DaemonSets to consider more than and hijack assets of the K8s clusters they attack,” cloud security organization Aqua reported in a report shared with The Hacker Information. The Israeli organization, which dubbed the attack RBAC Buster, reported it observed 60 uncovered K8s clusters that have been exploited by the menace actor driving this marketing campaign.

The attack chain commenced with the attacker gaining original accessibility by means of a misconfigured API server, adopted by examining for evidence of competing miner malware on the compromised server and then employing RBAC to set up persistence.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The attacker designed a new ClusterRole with around admin-degree privileges,” the firm explained. “Following, the attacker created a ‘ServiceAccount’, ‘kube-controller’ in the ‘kube-system’ namespace. Lastly, the attacker developed a ‘ClusterRoleBinding’, binding the ClusterRole with the ServiceAccount to produce a sturdy and inconspicuous persistence.”

In the intrusion observed versus its K8s honeypots, the attacker tried to weaponize the exposed AWS accessibility keys to get hold of an entrenched foothold into the environment, steal data, and escape the confines of the cluster.

Kubernetes RBAC

The closing step of the attack entailed the risk actor making a DaemonSet to deploy a container graphic hosted on Docker (“kuberntesio/kube-controller:1..1”) on all nodes. The container, which has been pulled 14,399 moments since its add five months in the past, harbors a cryptocurrency miner.

Impending WEBINARZero Trust + Deception: Learn How to Outsmart Attackers!

Find how Deception can detect advanced threats, quit lateral motion, and enrich your Zero Have faith in approach. Be a part of our insightful webinar!

Help you save My Seat!

“The container graphic named ‘kuberntesio/kube-controller’ is a circumstance of typosquatting that impersonates the authentic ‘kubernetesio’ account,” Aqua reported. “The picture also mimics the well-known ‘kube-controller-manager’ container impression, which is a critical ingredient of the regulate plane, managing in a Pod on each learn node, dependable for detecting and responding to node failures.”

Apparently, some of the methods explained in the campaign bear similarities to a further illicit cryptocurrency mining procedure that also took benefit of DaemonSets to mint Dero and Monero. It is really presently not apparent no matter whether the two sets of attacks are associated.

Discovered this write-up exciting? Stick to us on Twitter  and LinkedIn to study a lot more exclusive content we submit.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «ghosttoken flaw could let attackers hide malicious apps in google GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform
Next Post: Trojanized Installers Used to Distribute Bumblebee Malware Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.