Monday, February 24, 2025
HomeCryptocurrency hackHackers Attack Kubernetes Cluster to Deploy Crypto-Miners

Hackers Attack Kubernetes Cluster to Deploy Crypto-Miners

Published on

SIEM as a Service

Follow Us on Google News

The cybersecurity experts at Intezer have recently detected a cyberattack, and soon after detecting they have warned that the threat actors of this attack are using the Argo Workflows engine to start attacks on Kubernetes clusters to easily deploy crypto miners.

After detecting the cyberattack, the researchers started their deep investigation, and they found a number of vulnerable receptacles which are specifically used by organizations that deal with the following sectors:-

  • Technology sector
  • Financial sector
  • Logistics sector

Hackers abused Argo

Argo Workflows is an open-source containerized workflow engine that generally serves with Kubernetes, and it enables users to efficiently control parallel jobs from a convenient interface.

Nowadays the threat actors are targetting Argo because it keeps a huge number of users connected. Argo Workflows utilizes YAML files to determine the type of work that is to be performed.

According to the experts of Interzer report, whenever the permissions are misconfigured then it becomes a convenient opportunity for the threat actors and they easily utilize this chance to get access to an open Argo dashboard and implement their own workflow. 

However, during the investigation, it also came out that the threat actors of this attack have also deployed a popular cryptocurrency mining container, kannix/monero miner.

A new attack vector that is already used in the wild

The threat actors are already taking advantage of the new vector, and it has also been detected that several operators are dropping crypto miners and are using this attack vector.

However, the experts claim that the hackers easily gain access to this kind of cluster through Internet-exposed Argo dashboards. 

Once they gain access, soon they deploy their own malicious workflows simply by using different Monero miner containers, which also involves kannix/monero-miner, a deceased container that generally mines Monero utilizing the XMRig CPU/GPU miner.

Mitigation Proposal

The analysts of Intezer pronounced that if any users want to check whether they are misconfigured or not, well in that case they simply try accessing the Argo Workflows dashboard from any unauthenticated incognito browser that is present outside the corporate setting.

Apart from this, there is another way to check, that is to put a query the API of the user instance and verify the status code. There is no specific method that will help to bypass this kind of attack, but the experts have asserted that methodologies like the principle of least privilege (PoLP) should be embraced.

Moreover, users always refer to the application documentation if they desire to have best practices on security. While apart from all these things, the security researchers are trying their best to find all the details of this attack as well as some strong reliable mitigation.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...