Skip to Content
Hacking Kubernetes
book

Hacking Kubernetes

by Andrew Martin, Michael Hausenblas
October 2021
Intermediate to advanced
311 pages
7h 52m
English
O'Reilly Media, Inc.
Book available
Content preview from Hacking Kubernetes

Chapter 4. Applications and Supply Chain

The SUNBURST supply-chain compromise was a hostile intrusion of US Government and Fortune-500 networks via malware hidden in a legitimately signed, compromised server monitoring agent. The Cozy Bear hacking group used techniques described in this chapter to compromise many billion-dollar companies simultaneously. High value targets were prioritized by the attackers, so smaller organizations may have escaped the potentially devastating consequences of the breach.

Organizations targeted by the attackers suffered losses of data and may have been used as a springboard for further attacks against their own customers. This is the essential risk of a “trusted” supply chain: anybody who consumes something you produce becomes a potential target when you are compromised. The established trust relationship is exploited, and so malicious software is inadvertently trusted.

Often vulnerabilities for which an exploit exists don’t have a corresponding software patch or workaround. Palo Alto research determined this is the case for 80% of new, public exploits. With this level of risk exposure for all running software, denying malicious actors access to your internal networks is the primary line of defense.

The SUNBURST attack infected SolarWinds build pipelines and altered source code immediately before it was built, then hid the evidence of tampering and ensured the binary was signed by the CI/CD system so consumers would trust it.

These techniques were ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Kubernetes Security

Learn Kubernetes Security

Kaizhe Huang, Pranjal Jumde
Networking and Kubernetes

Networking and Kubernetes

James Strong, Vallery Lancey
Hacking APIs

Hacking APIs

Corey Ball
Kubernetes Operators

Kubernetes Operators

Jason Dobies, Joshua Wood

Publisher Resources

ISBN: 9781492081722Supplemental ContentErrata Page