Cryptomining campaign targets Kubernetes via machine learning toolkit

Cryptomining campaign targets Kubernetes via machine learning toolkit

A malware campaign is abusing the popular machine-learning (ML) framework Kubeflow in order to target Kubernetes clusters with a crypto miner, Microsoft’s Azure Security Center (ASC) warns.


Tens of clusters running on the Kubernetes open-source container orchestration system have already been impacted, the ASC notes in a blog post published this week.


“Nodes that are used for ML tasks are often relatively powerful, and in some cases include GPUs. This fact makes Kubernetes clusters that are used for ML tasks a perfect target for cryptomining campaigns, which was the aim of this attack,” explains blog post author Yossi Weizman, security research software engineer with ASC.


“Organizations should be mindful of the registries that users/clusters are allowed to download from,” said Wei Lien Dang, Co-Founder and Chief Strategy Officer at StackRox. “They should use private trusted registries, whitelist allowed images, and take other precautions to verify source assets. As Kubernetes clusters get larger and more powerful (as in this case with GPUs to run ML), they’ll become even more attractive for this type of attack. Organizations must take specific steps to ensure they’re p ..

Support the originator by clicking the read the rest link below.