Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.
Containers are isolated software packages that are lightweight and contain everything required for running an app.
In Kubernetes, a “sidecar” refers to an additional container that runs alongside the main application container in the same pod to enhance its capabilities.
However, cybersecurity researchers at TrendMicro recently discovered that threat actors can leverage the Sidecar Container injection technique to remain stealthily.
Sidecar containers help modularize features and functionalities that do not directly relate to the main application logic but which are necessary for efficient operation.
Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:
If you want to test all these features now with completely free access to the sandbox:
Here below, we have mentioned the ways to use sidecar containers for logging purposes legitimately:-
The Kubernetes threat matrix provides a structured understanding of the TTPs that may be employed by threat actors against Kubernetes installations as inspired by MITRE ATT&CK.
One technique, like MS-TA9011 Sidecar Injection, allows an attacker to inject a malicious sidecar container into a valid pod for unauthorized code execution and hiding operations rather than deploying another pod altogether.
This is related to MITRE’s Deploy Container (T1610) technique, which allows attackers to deploy containers onto systems they have compromised or gained access to.
They can also compromise the behavior of an already installed sidecar container, install malware, or execute unauthorized binaries such as cryptocurrency miners through API or kubectl tool.
When threatening Kubernetes clusters, this method helps them remain unnoticed within victims’ infrastructures.
Valid sidecar containers increase the difficulty of managing and detecting compromises in a Kubernetes cluster.
It is essential to consider them as any other container and watch out for strange operations. So, it is advisable to introduce a fresh MITRE ATT&CK technique that concentrates on sidecar injection.
Here below we have mentioned all the mitigations provided by the cybersecurity researchers:-
Here below we have mentioned all the recommendations:-
Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training ->
Try Free Demo
GitLab announced the release of critical security patches for its Community Edition (CE) and Enterprise…
Researchers have uncovered a vulnerability that allows attackers to compromise AMD's Secure Encrypted Virtualization (SEV)…
Splunk, the data analysis and monitoring platform, is grappling with a Remote Code Execution (RCE)…
In a major international operation codenamed “PowerOFF,” Europol, collaborating with law enforcement agencies across 15…
Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center (GSOC)…
Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and destructive…