Sunday, January 26, 2025
HomeCyber Security NewsFirst-Ever Cyber Attack Via Kubernetes RBAC to Create Backdoor on Clusters

First-Ever Cyber Attack Via Kubernetes RBAC to Create Backdoor on Clusters

Published on

SIEM as a Service

Follow Us on Google News

Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to assemble backdoors and mine cryptocurrency like Monero.

Kubernetes API access control system known as RBAC enables administrators to specify which service accounts or users have access to API operations and resources. 

This system provides precise access control and enhances security measures by limiting access to critical resources.

Cyber Attack Via Kubernetes RBAC

Threat actors can establish persistence on compromised clusters even after addressing the initial access misconfiguration by exploiting RBAC to enforce malicious access control policies.

An Aqua Security team named ‘Nautilus’ made a discovery of this new type of attack, which they called ‘RBAC Buster.’ It has been reported that 60 misconfigured Kubernetes clusters were compromised as a result of this campaign.

The threat actor established a powerful and covert persistence by crafting a new ClusterRole with almost full admin privileges, producing a ‘kube-controller’ ServiceAccount within the ‘kube-system’ namespace, and then linking the ClusterRole with the ServiceAccount via a ‘ClusterRoleBinding’.

Here the attacker sought to exploit the AWS access keys exposed in its K8s honeypots to:-

  • Establish an ongoing foothold in the system.
  • Extract sensitive information
  • Evade the cluster’s restrictions

Several existing deployments were also deleted by the attacker in different namespaces, which include:-

  • kube-secure-fhgxtsjh
  • kube-secure-fhgxt
  • api-proxy
  • worker-deployment

The perpetrator’s last move involved generating a DaemonSet to spread a Docker-hosted container image (“kubernetesio/kube-controller:1.0.1”) on every node as part of the attack.

The cryptocurrency miner is hidden within the container, which has been downloaded over 14,000 times in the last five months. By typosquatting the legitimate ‘kubernetesio’ account, the ‘kuberntesio/kube-controller’ container image deceives users. 

The image further imitates the essential ‘kube-controller-manager’ container image, responsible for detecting and addressing node failures, and runs within a Pod on every master node.

Upon examining the configuration file, it became apparent that the perpetrator had already mined 5 XMR and could earn up to $200 annually per worker.

Moreover, RBAC Buster attacks on Kubernetes clusters can result in severe outcomes such as:- 

Mitigations

Here below we have mentioned the security measures that are recommended by the experts to mitigate the threat:-

  • Prohibit unauthenticated requests from anonymous users.
  • Make sure to secure the API server.
  • Ensure to employ Role-Based Access Control (RBAC) effectively.
  • Enforce strict API access policies.
  • Regularly monitor audit logs.
  • Make sure to encrypt any secrets with proper encryption.
  • Always secure the account credentials hosted in the cluster.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

INE Security Alert: Expediting CMMC 2.0 Compliance

INE Security, a leading global provider of cybersecurity training and certifications, today announced a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...