How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and How to Secure Your Cluster
The article recounts a Kubernetes cluster intrusion where a misconfigured kubelet allowed crypto‑mining, details the forensic steps taken—including empty iptables, kubelet API exposure, and commented‑out settings—and offers concrete hardening recommendations to prevent similar attacks.