April 22, 2023, 5:17 p.m. |

BankInfoSecurity.com RSS Syndication www.bankinfosecurity.com

Attackers Deployed DaemonSets to Steal Resources from Victims
Threat actors are exploiting Kubernetes Role Based Access Control in the wild to create backdoors and to run cryptocurrency miners. Researchers observed a recent campaign that targeted at least 60 Kubernetes clusters by deploying DaemonSets to hijack and steal resources from the victims' clusters.

access access control attackers backdoor backdoors campaign clusters control cryptocurrency exploiting exploits hijack kubernetes kubernetes clusters miners novel rbac researchers resources role run steal

Cybersecurity Consultant

@ Devoteam | Cité Mahrajène, Tunisia

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Phoenix, AZ, United States

(Senior) Director of Information Governance, Risk, and Compliance

@ SIXT | Munich, Germany

Information System Security Engineer

@ Space Dynamics Laboratory | North Logan, UT

Intelligence Specialist (Threat/DCO) - Level 3

@ Constellation Technologies | Fort Meade, MD

Cybersecurity GRC Specialist (On-site)

@ EnerSys | Reading, PA, US, 19605