Thursday, April 17, 2025
HomeCloudAttackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Published on

SIEM as a Service

Follow Us on Google News

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running. 

Containers are isolated software packages that are lightweight and contain everything required for running an app. 

In Kubernetes, a “sidecar” refers to an additional container that runs alongside the main application container in the same pod to enhance its capabilities. 

- Advertisement - Google News

However, cybersecurity researchers at TrendMicro recently discovered that threat actors can leverage the Sidecar Container injection technique to remain stealthily.

Sidecar Container Injection Technique

Sidecar containers help modularize features and functionalities that do not directly relate to the main application logic but which are necessary for efficient operation.

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

They have the same lifecycle and a local network with the primary container that follows the single responsibility principle and improves system maintainability.

Here below, we have mentioned the ways to use sidecar containers for logging purposes legitimately:-

  • The sidecar container directs application logs to its standard output:
Streaming sidecar container (Source – Trend Micro)
  • The sidecar container operates a logging agent to retrieve logs from the application container:
Sidecar container with a logging agent (Source – Trend Micro)

The Kubernetes threat matrix provides a structured understanding of the TTPs that may be employed by threat actors against Kubernetes installations as inspired by MITRE ATT&CK

One technique, like MS-TA9011 Sidecar Injection, allows an attacker to inject a malicious sidecar container into a valid pod for unauthorized code execution and hiding operations rather than deploying another pod altogether. 

This is related to MITRE’s Deploy Container (T1610) technique, which allows attackers to deploy containers onto systems they have compromised or gained access to.

They can also compromise the behavior of an already installed sidecar container, install malware, or execute unauthorized binaries such as cryptocurrency miners through API or kubectl tool. 

When threatening Kubernetes clusters, this method helps them remain unnoticed within victims’ infrastructures.

Valid sidecar containers increase the difficulty of managing and detecting compromises in a Kubernetes cluster.

It is essential to consider them as any other container and watch out for strange operations. So, it is advisable to introduce a fresh MITRE ATT&CK technique that concentrates on sidecar injection.

Mitigations And Recommendations

Here below we have mentioned all the mitigations provided by the cybersecurity researchers:-

  • MS-M9003: Adhere to least-privilege principle
  • MS-M9013: Restrict over permissive containers
  • MS-M9005.003: Gate images deployed to Kubernetes cluster

Here below we have mentioned all the recommendations:-

  • Ensure there’s a valid justification for segregating the containers.
  • Aim for concise, modular designs.
  • Be mindful of resource boundaries.

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...