• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Nearly One Million Misconfigured Kubernetes Exposed That Could Cause Data Breaches

You are here: Home / General Cyber Security News / Nearly One Million Misconfigured Kubernetes Exposed That Could Cause Data Breaches
June 28, 2022

An investigation from cybersecurity firm Cyble has located more than 900,000 Kubernetes (K8s) uncovered throughout the internet and therefore susceptible to malicious scans and/or facts-exposing cyberattacks.

The researchers clarified that whilst not all uncovered scenarios are susceptible to attacks or the reduction of delicate details, these misconfiguration procedures might make providers lucrative targets for threat actors (TA) in the long run.

For context, Kubernetes is an open-supply program made to automate the deployment, scaling and administration of containerized applications.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


K8s depend on a combination of physical and virtual devices to develop a uniform software programming interface (API) that guarantees there is no downtime in a output ecosystem.

Whilst particularly practical for these explanations, when not properly configured Kubernetes can signify a vulnerability that could guide to data exfiltration and other hacking attempts.

For instance, back in  March 2018, Tesla’s cloud was compromised due to insecurely configured Kubernetes clusters, and in June 2020, hackers infiltrated a K8s toolkit to spread cryptocurrency mining malware across a number of clusters.

Much more a short while ago, security scientists from Apiiro discovered a vulnerability in the open-supply continuous shipping system Argo CD that lets attackers obtain and exfiltrate delicate facts like passwords and API keys from clusters.

“Online scanners have produced it easy for security scientists to uncover the publicity of property,” discussed the Cyble researchers in an advisory.

“Regardless, at the exact time, destructive hackers can also investigate the exposed Kubernetes occasion for a particular corporation, increasing the risk of attack.”

The Cyble examination seen that the United States has the best exposure count, followed by China and Germany.

Numerous of the misconfigured clusters spotted by cybersecurity scientists had been thanks to the use of default configurations.

“Misconfigurations like making use of default container names, not acquiring the Kubernetes Dashboard secured by a secure password and leaving default assistance ports open to the public can place organizations at risk of facts leakage.”

To prevent misconfigurations, Cyble claimed organizations need to retain Kubernetes up to date to the most current model and take out debugging tools from creation containers.

Additional, People today with access to the Kubernetes API really should have their permissions reviewed carefully and on a standard basis, and exposure of critical belongings and ports must be constrained as considerably as doable.

For more suggestions and technological particulars, you can obtain the whole text of Cyble’s advisory here.


Some elements of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «zuorat malware hijacking home office routers to spy on targeted networks ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks
Next Post: Hackers Deploy Shadowpad Backdoor and Target Industrial Control Systems in Asia Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.