Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to assemble backdoors and mine cryptocurrency like Monero.
Kubernetes API access control system known as RBAC enables administrators to specify which service accounts or users have access to API operations and resources.
This system provides precise access control and enhances security measures by limiting access to critical resources.
Threat actors can establish persistence on compromised clusters even after addressing the initial access misconfiguration by exploiting RBAC to enforce malicious access control policies.
An Aqua Security team named ‘Nautilus’ made a discovery of this new type of attack, which they called ‘RBAC Buster.’ It has been reported that 60 misconfigured Kubernetes clusters were compromised as a result of this campaign.
The threat actor established a powerful and covert persistence by crafting a new ClusterRole with almost full admin privileges, producing a ‘kube-controller’ ServiceAccount within the ‘kube-system’ namespace, and then linking the ClusterRole with the ServiceAccount via a ‘ClusterRoleBinding’.
Here the attacker sought to exploit the AWS access keys exposed in its K8s honeypots to:-
Several existing deployments were also deleted by the attacker in different namespaces, which include:-
The perpetrator’s last move involved generating a DaemonSet to spread a Docker-hosted container image (“kubernetesio/kube-controller:1.0.1”) on every node as part of the attack.
The cryptocurrency miner is hidden within the container, which has been downloaded over 14,000 times in the last five months. By typosquatting the legitimate ‘kubernetesio’ account, the ‘kuberntesio/kube-controller’ container image deceives users.
The image further imitates the essential ‘kube-controller-manager’ container image, responsible for detecting and addressing node failures, and runs within a Pod on every master node.
Upon examining the configuration file, it became apparent that the perpetrator had already mined 5 XMR and could earn up to $200 annually per worker.
Moreover, RBAC Buster attacks on Kubernetes clusters can result in severe outcomes such as:-
Here below we have mentioned the security measures that are recommended by the experts to mitigate the threat:-
Struggling to Apply The Security Patch in Your System? –
Try All-in-One Patch Manager Plus
Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series…
Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware targeting…
A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and…
Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.…
Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated…
EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…