Tag

crypto mining

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Feb 1, 2023 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and How to Secure Your Cluster

The article recounts a Kubernetes cluster intrusion where a misconfigured kubelet allowed crypto‑mining, details the forensic steps taken—including empty iptables, kubelet API exposure, and commented‑out settings—and offers concrete hardening recommendations to prevent similar attacks.

Cluster HardeningKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and How to Secure Your Cluster
Efficient Ops
Efficient Ops
Nov 26, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do

A self‑built Kubernetes cluster suffered a crypto‑mining intrusion due to empty iptables and a misconfigured kubelet, prompting a detailed post‑mortem that outlines the symptoms, root‑cause analysis, and practical hardening steps to protect similar environments.

Incident ResponseKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do
Efficient Ops
Efficient Ops
Sep 12, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach—and How to Prevent It

A Kubernetes node was compromised for Monero mining due to empty iptables, exposed kubelet API, and a commented‑out security flag, prompting a detailed forensic analysis and a set of hardening steps to secure the cluster against similar attacks.

Cluster HardeningKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach—and How to Prevent It
macrozheng
macrozheng
Nov 26, 2020 · Information Security

Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix

After my small 1‑CPU, 2 GB server was compromised by a crypto‑mining virus that hijacked SSH access, I used VNC to investigate, identified malicious processes, traced infected files, removed cron jobs, restored system utilities, repaired SELinux, and closed the Redis vulnerability to fully recover the machine.

Incident ResponseLinuxRedis vulnerability
0 likes · 10 min read
Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix
Efficient Ops
Efficient Ops
Jan 29, 2019 · Information Security

How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough

This article details a multi‑stage server compromise that injected gambling pages, planted hidden accounts, deployed crypto‑mining software, and opened unnecessary ports, providing step‑by‑step forensic analysis, code inspection, emergency response actions, and indicators of compromise.

Incident Responsecrypto mininginformation security
0 likes · 12 min read
How Hackers Hijacked a Server with Hidden Accounts and Crypto‑Mining: A Forensic Walkthrough