Unit 42 researchers document a 282% increase in Kubernetes-related threat actor operations over the past year, with the IT sector accounting for 78% of observed activity. Two real-world case studies are analyzed: a North Korean Slow Pisces (Lazarus) intrusion at a cryptocurrency exchange involving stolen Kubernetes service

27m read timeFrom unit42.paloaltonetworks.com
Post cover image
Table of contents
Executive SummaryThe Kubernetes Cloud Attack SurfaceThreat Actor ActivityTooling and TTPsKubernetes Threat DetectionPractical Kubernetes Configurations for Security TeamsConclusionIndicators of CompromiseAdditional ResourcesAppendix A: Alert Activity DataAppendix B: Cortex Detections

Sort: