Notorious Malware CyberGang Goes All in on Unsecured Kubernetes Clusters

Notorious Malware CyberGang Goes All in on Unsecured Kubernetes Clusters

Notorious Malware CyberGang Goes All in on Unsecured Kubernetes Clusters. TeamTNT, a notorious cybergang known for its container-based attacks on cloud infrastructure, has found Kubernetes to be a useful tool in its efforts to mine Monero cryptocurrency from other people’s servers.

TeamTNT, a notorious cybergang known for its container-based attacks on cloud infrastructure, has found Kubernetes to be a useful tool in its efforts to mine Monero cryptocurrency from other people’s servers, according to a new report from Unit 42, the research arm of Palo Alto Networks.

On their own four-node “Honeypot” Kubernetes cluster, the researchers watched the attackers roll out a sophisticated attack that commandeered their containers using common Linux and cloud native tools. The actions were part of a larger botnet, dubbed “Hildegard,” whose size is still undetermined.

“From another ongoing research, we do know that there are at least 2,000 misconfigured Kubernetes clusters,” noted Jay Chen, a Unit 42 senior cloud researcher. These misconfigured systems can be easily found by searching Shodan Internet of Things search engine, and the by search capabilities offered by security vendor Censys. “These misconfigured Kubernetes are all potential targets.”

cloud native kubernetes security cybergang

Bootstrap 5 Complete Course with Examples

Bootstrap 5 Tutorial - Bootstrap 5 Crash Course for Beginners

Nest.JS Tutorial for Beginners

Hello Vue 3: A First Look at Vue 3 and the Composition API

Building a simple Applications with Vue 3

Deno Crash Course: Explore Deno and Create a full REST API with Deno

How to Build a Real-time Chat App with Deno and WebSockets

Convert HTML to Markdown Online

HTML entity encoder decoder Online

50+ Useful Kubernetes Tools for 2020 - Part 2

Our original Kubernetes tool list was so popular that we've curated another great list of tools to help you improve your functionality with the platform.

How native is React Native? | React Native vs Native App Development

Article covers: How native is react native?, React Native vs (Ionic, Cordova), Similarities and difference between React Native and Native App Development.

Kubernetes Security 101: Cloud Native Runtime Security with Falco

Kubernetes Security 101: Cloud Native Runtime Security with Falco. As Kubernetes continues to grow in adoption, it is important for us to know how to secure it. In a dynamic infrastructure platform such as Kubernetes, detecting and addressing threats is important but also challenging at the same time.

Multi-cloud Spending: 8 Tips To Lower Cost

Mismanagement of multi-cloud expense costs an arm and leg to business and its management has become a major pain point. Here we break down some crucial tips to take some of the management challenges off your plate and help you optimize your cloud spend.

Kubernetes in the Cloud: Strategies for Effective Multi Cloud Implementations

This article explains how you can leverage Kubernetes to reduce multi cloud complexities and improve stability, scalability, and velocity.