Hackers have found yet another way to attack Kubernetes clusters
Double-check the configuration of your cloud containers, security experts warn
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Cybersecurityresearchers have detailed a new attack vector that dropscryptominingmalware inKubernetesclusters by exploiting misconfigured Argo Workflows instances.
Argo Workflows is anopen sourceworkflow engine for Kubernetes that simplifies the process of orchestrating parallel jobs on Kubernetes clusters.
Researchers fromIntezerfound hundreds of Argo Workflows instances with misconfigured permissions, and observed many being abused by malicious threat actors.
We’re looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won’t take more than 60 seconds of your time, and we’d hugely appreciate if you’d share your experiences with us.
Click here to start the survey in a new window«
“We have identified infected nodes and there is the potential for larger scale attacks due to hundreds of misconfigured deployments. We have detected exposed instances of Argo Workflows that belong to companies from different sectors including technology, finance and logistics,” note Intezer’s Ryan Robinson and Nicole Fishbein in ajoint blog post.
Improperly configured
The researchers argue that even products like Argo Workflows that are designed to reduce deployment complexity, can be turned into a source for exploitation if not configured properly.
While hunting for such misconfigured instances, the researchers found several that were either unprotected or had liberal permission settings that would allow any user to deploy workflows.
In one cluster, we noticed that a popular cryptocurrency mining container, kannix/monero-miner, which usedXMRigto mine for Monerocryptocurrency, was being deployed.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
As a side note, the researchers note that while the kannix/monero-miner has since been removed fromDocker Hub, the popular Docker repository still lists at least 45 other cryptomining containers that have clocked millions of downloads.
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.
Dangerous Android banking malware looks to trick victims with fake money transfers
Sophos Firewall hack on government network used an all-new custom malware
Best genealogy tool of 2024