Efficient Ops
Feb 8, 2022 · Information Security
Kubelet Misconfiguration Triggered a Mining Attack – What We Learned
After discovering a compromised node in our self‑built Kubernetes cluster that was being used for Monero mining, we traced the breach to empty iptables rules and a misconfigured kubelet allowing anonymous API access, then outlined firewall hardening, network isolation, and secure kubelet practices to prevent future intrusions.
KubernetesMining Attackfirewall
0 likes · 6 min read