Kinsing crypto malware breaching Kubernetes clusters via PostgreSQL

Kinsing crypto malware breaching Kubernetes clusters via PostgreSQL

Operators of the Kinsing cryptojacking malware are now compromising Kubernetes clusters by using vulnerabilities in container images and misconfigured PostgreSQL servers to gain initial access to Kubernetes environments.

Microsoft's Defender for Cloud team said that they have recently observed a large amount of clusters that were infected with Kinsing and ran a PostgreSQL container. The misconfiguration relates to ‘trust authentication’ setting, which could be leveraged by a threat actor to connect to the Postgres servers without authentication and achieve remote code execution. Microsoft also warns that some network configurations in Kubernetes are susceptible to ARP poisoning, allowing attackers to impersonate applications in the cluster.

“Therefore, even specifying a private IP address in the “trust” configuration may pose a security risk,” the team notes. “In general, allowing access to a broad range of IP addresses is exposing the PostgreSQL container to a potential threat.”

Microsoft said it has also observed an uptick in the Kinsing attacks targeting servers running vulnerable versions of PHPUnit, Liferay, Oracle WebLogic, and WordPress applications. In case of WebLogic the threat actors have been seen exploiting a slew of vulnerabilities, namely, CVE-2020-14882, CVE-2020-14883, and CVE-2020-14750 to achieve remote code execution.

“Exposing the cluster to the Internet without proper security measures can leave it open to attack from external sources. In addition, attackers can gain access to the cluster by taking advantage of known vulnerabilities in images,” Microsoft said. ”It’s important for security teams to be aware of exposed containers and vulnerable images and try to mitigate the risk before they are breached.”

Back to the list

Latest Posts

Cyber Security Week in Review: May 2, 2025

Cyber Security Week in Review: May 2, 2025

In brief: SonicWall warns of active exploitation of recently patched bugs, Commvault confirms a nation-state zero-day attack, and more.
2 May 2025
Nation-state hackers exploit zero-day in Commvault Azure environment

Nation-state hackers exploit zero-day in Commvault Azure environment

Additionally, SonicWall has warned that two flaws affecting its SMA100 appliances are being actively exploited in the wild.
1 May 2025
New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

After Garantex’s domains were seized, Grinex was immediately promoted in Telegram channels.
30 April 2025