Unit 42 researchers document a 282% increase in Kubernetes-related threat actor operations over the past year, with the IT sector accounting for 78% of observed activity. Two real-world case studies are analyzed: a North Korean Slow Pisces (Lazarus) intrusion at a cryptocurrency exchange involving stolen Kubernetes service
Table of contents
Executive SummaryThe Kubernetes Cloud Attack SurfaceThreat Actor ActivityTooling and TTPsKubernetes Threat DetectionPractical Kubernetes Configurations for Security TeamsConclusionIndicators of CompromiseAdditional ResourcesAppendix A: Alert Activity DataAppendix B: Cortex DetectionsSort: