If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

Two Distinctive Methods of Cyberattacks Using Kinsing in Kubernetes

Started by Hosting News, Jan 11, 2023, 03:24 AM

Previous topic - Next topic

Hosting NewsTopic starter

The Kinsing malware serves multiple purposes in Kubernetes environments, including exploiting vulnerabilities in images and poorly configured PostgreSQL.



One of the well-known ways in which Kinsing is used is to steal cryptocurrency from Linux devices. There are two types of cyberattacks that can be prevented by using various methods. Hackers use Kinsing in Kubernetes clusters to exploit weaknesses in images as well as poorly configured PostgreSQL. To avoid these types of attacks, users should trust only official repositories and update their software periodically while maintaining secure configurations.

One way in which Kinsing is used is by exploiting vulnerabilities in images. Attackers exploit flaws in remote code execution by searching for open ports that match with specific programs such as PHPUnit, WordPress, Liferay, and Oracle WebLogic, among others. Hackers then use this vulnerability to deploy malicious payloads such as Kinsing. To avoid such an attack, it is essential to use the most recent versions of the images and trust only official repositories.

Another method to exploit Kubernetes environments is by taking advantage of poorly configured PostgreSQL. Using 'trust authentication' is the first mistake in configuring the container, which allows anyone who can connect to the server to access the database with any username, including superuser names. When the PostgreSQL container is accessible to a broad range of IP addresses, it is susceptible to attacks. To prevent such attacks, Microsoft Defender for Cloud can be used.

Without adequate security measures, Kubernetes environments are vulnerable to real-life cyber attacks. To be secure against such attacks, users need to keep their software up-to-date, use secure configurations, and trust only official repositories.
  •  


ashimasalim

Kinsing malware targets Kubernetes clusters by exploiting vulnerabilities in container images and misconfigured PostgreSQL containers, resulting in the theft of hardware resources to mine cryptocurrencies. Securitylab reports that Kinsing is a Linux-based malware aimed specifically at container environments.

Security experts have discovered that hackers use two primary methods to gain access to Linux servers. The first method is by exploiting vulnerabilities in container images, while the second involves incorrectly configured PostgreSQL database servers. Once initial access is gained, hackers can infect Kubernetes clusters with Kinsing malware and utilize the server's resources for mining cryptocurrency. It is crucial for users to secure their systems and update software periodically to prevent such attacks.
  •  

webwrappedup

Kinsing is a malicious payload that target kubernetes clusters and is primarily used for cryptomining purposes.

Firstly, one common method of attack is the exploitation of misconfigured services. Many administrators don't set their permissions correctly, which can result in an easy access for attackters. Once Kinsing gains entry, it can download additional malicious components to enhance its capabilities.
Scanners are frequently utilized by the attackers, allowing them to indentify vulnerable targets. These scanners search for Kubernetes clusters that are poorly secured, and once found, the attack commences. Once inside, Kinsing can rapidly deploy itself across pods and nodes, taking advantage of the resources without alerting the system.

Additionally, Kinsing can also leverage SSH access. If there's weak password policies or exposed SSH ports, attackers can gain entry without being detected. Once inside, they can increase their foothold by further exploiting the Kubernetes API.

Moreover, after compromissing the cluster, they will often try to hide their tracks. They do this by deleting logs or by obfuscating their files to blend in with normal Kubernetes operations. This makes it challenging for systems engineers to detect the malicious activities happening under their noses.
Protecting Kubernetes from Kinsing attacks involves implementing robust security measures, including proper configuration, updated software, and continuous monitoring for unusual activities. As an engineer, I urge all organizations to take these threats seriously and bolster their defenses.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...