Rootkit Turns Kubernetes From Orchestration to Subversion

Rootkit Turns Kubernetes From Orchestration to Subversion

November 22, 2023 at 11:26AM

Kubernetes, a popular orchestration platform for containerized software environments, has become a target for attackers. While most attacks have focused on stealing cloud compute resources for cryptocurrency mining, security researchers warn that rootkit infections could give attackers greater control over Kubernetes clusters. These rootkits can hide malicious containers and perform sophisticated actions undetected by the operating system. Misconfigurations and vulnerabilities in Kubernetes infrastructure and applications pose significant security concerns. Experts recommend increased visibility, purple teaming exercises, and minimizing exposure of Kubernetes to the internet to mitigate these risks.

Key Takeaways from Meeting Notes:

1. Popularity of orchestration platforms like Kubernetes has made them a target for attackers. Most reported attacks involve deploying cryptomining-focused containers that steal cloud compute resources for cryptocurrency mining.
2. The compromise of a Kubernetes cluster by a rootkit would allow attackers to hide malicious containers on the system and perform sophisticated actions undetected by the operating system.
3. Vulnerabilities and misconfigurations are major concerns for Kubernetes. Misconfigured applications running in containers are the most common way that the platform is compromised.
4. While specific Kubernetes-focused rootkits are not yet popular, security researchers anticipate that attackers will increasingly target Kubernetes deployments and develop relevant rootkits.
5. Administrators can improve visibility and security by monitoring for kernel modules that should not be loaded during runtime and conducting purple teaming exercises with their red teams.
6. It is recommended to avoid exposing Kubernetes directly to the internet as a preventive measure against attacks.

Full Article