Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Several vendors in recent days have reported a huge surge in illegal crypto-mining activity involving millions of hijacked computers worldwide.
Kubernetes have been phenomenal in improving developer productivity. With lightweight portable containers, packaging and running application code is effortless. However, while developers and applications can benefit from them, many organizations have knowledge and governance gaps, which can create security gaps.
Some of the Past Cases of Cryptocurrency on Kubernetes cluster:
Tesla Case: The cyber thieves gained access to Tesla's Kubernetes administrative console, which exposed access credentials to Tesla's AWS environment. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the services that are running, get into every pod to access processes, inspect files and tokens, and steal secrets managed by the Kubernetes cluster.
Jenkins Case: Hackers used an exploit to install malware on Jenkins servers to perform crypto mining, making over $3 million to date. Although most affected systems were personal computers, it’s a stern warning to enterprise security teams planning to run Jenkins in containerized form that constant monitoring and security is required for business critical applications.
Recently, Azure Security Center detected a new crypto mining campaign that targets specifically Kubernetes environments. What differs this attack from other crypto mining attacks is its scale: within only two hours a malicious container was deployed on tens of Kubernetes clusters.
There are three options for how an attacker can take advantage of the Kubernetes dashboard:
How could this be avoided?
As per Microsoft's Recommendations, follow the below:
Refer: Azure Kubernetes Services integration with Security Center
Source: https://azure.microsoft.com/en-us/blog/detect-largescale-cryptocurrency-mining-attack-against-kubernetes-clusters/
Kubernetes have been phenomenal in improving developer productivity. With lightweight portable containers, packaging and running application code is effortless. However, while developers and applications can benefit from them, many organizations have knowledge and governance gaps, which can create security gaps.
Some of the Past Cases of Cryptocurrency on Kubernetes cluster:
Tesla Case: The cyber thieves gained access to Tesla's Kubernetes administrative console, which exposed access credentials to Tesla's AWS environment. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the services that are running, get into every pod to access processes, inspect files and tokens, and steal secrets managed by the Kubernetes cluster.
Jenkins Case: Hackers used an exploit to install malware on Jenkins servers to perform crypto mining, making over $3 million to date. Although most affected systems were personal computers, it’s a stern warning to enterprise security teams planning to run Jenkins in containerized form that constant monitoring and security is required for business critical applications.
Recently, Azure Security Center detected a new crypto mining campaign that targets specifically Kubernetes environments. What differs this attack from other crypto mining attacks is its scale: within only two hours a malicious container was deployed on tens of Kubernetes clusters.
There are three options for how an attacker can take advantage of the Kubernetes dashboard:
- Exposed dashboard: The cluster owner exposed the dashboard to the internet, and the attacker found it by scanning.
- The attacker gained access to a single container in the cluster and used the internal networking of the cluster for accessing the dashboard.
- Legitimate browsing to the dashboard using cloud or cluster credentials.
How could this be avoided?
As per Microsoft's Recommendations, follow the below:
- Do not expose the Kubernetes dashboard to the Internet: Exposing the dashboard to the Internet means exposing a management interface.
- Apply RBAC in the cluster: When RBAC is enabled, the dashboard’s service account has by default very limited permissions which won’t allow any functionality, including deploying new containers.
- Grant only necessary permissions to the service accounts: If the dashboard is used, make sure to apply only necessary permissions to the dashboard’s service account. For example, if the dashboard is used for monitoring only, grant only “get” permissions to the service account.
- Allow only trusted images: Enforce deployment of only trusted containers, from trusted registries.
Refer: Azure Kubernetes Services integration with Security Center
Source: https://azure.microsoft.com/en-us/blog/detect-largescale-cryptocurrency-mining-attack-against-kubernetes-clusters/
Excellent .. Amazing .. I’ll bookmark your blog and take the feeds also…I’m happy to find so many useful info here in the post, we need work out more techniques in this regard, thanks for sharing. click
ReplyDeleteWhen utilized, the exchange data is communicated to a blockchain in the system under an open key, keeping each coin from being spent twice from a similar client. The blockchain can be thought of as the clerk's register.Getnode Test
ReplyDeleteInteresting and amazing how your post is! It Is Useful and helpful for me That I like it very much, and I am looking forward to Hearing from your next.. Where to buy antminers
ReplyDeleteThis will lead to a lot of dynamism and liquidity much needed for Free $10 in Bitcoin when you signup any growing financial markets. Cryptocurrency will become the defacto currency for transactions all over the world.
ReplyDeleteYour shared three options for how an attacker can take advantage of the Kubernetes dashboard are very beneficial for us , because , by following we can safe our data. Essay Writing Service
ReplyDeleteTo send Bitcoins to another client or pay for online buys, get that individual/merchant's distinguishing proof number and move Bitcoins on the web. bitcoin mixer
ReplyDeleteThe awesome thing about coin enchantment is that it tends to be performed anyplace, whenever. Stunning impacts can be cultivated without any tricks or planning at all, and coins are one prop that is consistently near. coin master
ReplyDeleteA debt of gratitude is in order for your post. I've been contemplating composing an extremely tantamount post in the course of the last couple of weeks, I'll most likely keep it straightforward and connection to this rather if thats cool. Much obliged. Best ethereum cryptocurrency investment website
ReplyDeleteThis is my first time i visit here. I found so many interesting stuff in your blog especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the enjoyment here keep up the good work Top 10 cryptocurrency stocks to invest in
ReplyDeleteIn electronic interfaces the players can play the online casino games straightforwardly in the nearby PC framework, without downloading any extra programming. In the second kind programming must be basically downloaded. Play Vegas Slots
ReplyDeleteI found that site very usefull and this survey is very cirious, I ' ve never seen a blog that demand a survey for this actions, very curious... best cryptocurrency index fund
ReplyDeleteGreat survey, I'm sure you're getting a great response. farmacia online bitcoin españa
ReplyDeleteA very delightful article that you have shared here. Your blog is a valuable and engaging article for us, and also I will share it with my companions who need this info,buy cryptocurrency with MastercardCanada Thankful to you for sharing an article like this.
ReplyDeleteI liked your work and, as a result, the manner you presented this content about Cryptocurrency Online Trading.It is a valuable paper for us. Thank you for sharing this blog with us.
ReplyDeleteVery nice! Guys! Don't waste your time and come! Come here and check how go it is! This is the best service fore essay writing and homework, and you can be sure! You can be sure that they will help you! Just write them personal statement writing help papers writing services and be happy to use! Good luck!
ReplyDeleteI am very thankful to you that you have shared this information with us. Read more info about Crypto Buy and Sell Services in Nigeria. I got some different kind of knowledge from your web page, and it is really helpful for everyone. Thanks for share it.
ReplyDelete