Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Kubernetes attack surface explodes: number of threats quadruples
6 min Security

Kubernetes attack surface explodes: number of threats quadruples

Erik van KlinkenApril 20, 2026 10:30 amApril 20, 2026
Kubernetes attack surface explodes: number of threats quadruples

Kubernetes is the industry standard for cloud-native workloads. Its ubiquity invites cyberattackers to exploit its vulnerabilities. The orchestration layer behind the modern cloud is facing not only a massive increase in the number of attacks but also increasingly sophisticated cyber threats.

The number of Kubernetes-based attack attempts has increased by 282 percent in just one year. Palo Alto Networks’ Unit 42 reports that the IT sector is by far the hardest hit in this area. 78 percent of all malicious activity targets this sector. The targets are selective, such as crypto exchanges. While the well-known Bybit was compromised via AWS tokens in early 2025, Unit 42 discovered a breach of another crypto exchange via Kubernetes credentials.

Read the full report

Why Kubernetes?

Before we dive deeper into the case studies, it’s important to emphasize that this development is only logical. Kubernetes is a globally used standard for orchestrating large-scale applications in the cloud. Despite this adoption, now almost a given regardless of the cloud provider, security has never been inherently built into the technology. Instead, it relies on solutions that secure credentials and ensure isolation.

Attackers are increasingly targeting the identities running within Kubernetes clusters. These are the so-called service account tokens. These tokens grant pods access to the Kubernetes API. Anyone who obtains such a token may have direct access to the entire cluster infrastructure. In 22 percent of cloud environments in 2025, suspicious activity indicative of token theft was detected, according to Unit 42.

Crypto exchange compromised via malicious Kubernetes pod

We return to the previously mentioned breach of the crypto exchange in mid-2025, observed by security researchers at Palo Alto Networks. The attack is linked to Slow Pisces, also known as Lazarus or TraderTraitor. It is a North Korean state-sponsored group with financial motives. Because crypto coins can be stolen as entire wallets, platforms like Bybit and the exchange affected later are extremely attractive targets.

Through spearphishing, the attacker gained access to a developer’s workstation. He then exploited that employee’s active, privileged cloud session to deploy a malicious pod in the production Kubernetes cluster.

That pod was specifically designed to expose the mounted service account token. The token turned out to belong to an administrative account with extensive privileges, used by a CI/CD system via role-based access control. Using that identity, the attacker authenticated directly with the Kubernetes API server, intercepted secrets, was able to tamper with workloads across multiple namespaces, and planted a backdoor in a production pod. The attacker then moved through the network toward the exchange’s financial infrastructure, stealing millions in cryptocurrency.

Slow Pisces had previously been linked to the aforementioned Bybit hack from February of last year. At that time, approximately $1.5 billion worth of Ethereum was stolen. As of this writing, it is the largest digital theft in history. In May 2025, an attack followed on the Taiwanese crypto exchange BitoPro, again via social engineering and stolen AWS tokens.

React2Shell: attacks within two days of disclosure

A second case cited by Unit 42 concerns CVE-2025-55182, also known as React2Shell. This vulnerability in React Server Components was disclosed on December 3. Targeted attacks on cloud services followed soon after, specifically between December 5 and 7. Due to insecure deserialization in the RSC Flight protocol, attackers could execute arbitrary code in application containers behind ingress controllers and cloud load balancers.

Once inside the pod, all doors were open. In other words, access could be gained to the file system, environment variables, network information, and mounted identities. Attackers used that access to steal service account tokens, extract cloud credentials from environment variables, and move on to the underlying cloud account.

In multiple cases, cryptominers were installed, backdoors were placed, and database credentials were stolen. It is not unusual for attacks to follow a disclosure so quickly: research by Wiz shows that AKS clusters are attacked on average within 18 minutes of creation, and EKS clusters within 28 minutes.

Familiar tools, recognizable pattern

In these compromises, attackers “neatly” follow the MITRE ATT&CK framework. First, initial access via a vulnerability (T1190) or social engineering, followed by token theft (T1528). Using the stolen service account token, attackers maneuver within the cluster and escalate privileges. So the attacks aren’t that unique, but the enormous scope of Kubernetes makes a compromise via this infrastructure extremely widespread.

Frameworks such as Peirates, originally built for red teams, significantly aid the attackers. Peirates can create and query service accounts, secrets, and cloud metadata. Unit 42 points to multiple groups that, among other things, build special plugins into their malware to retrieve large amounts of sensitive data with minimal activity.

Kubernetes has several critical vulnerabilities that attackers exploit, with misconfigurations in RBAC and pod security settings being the most common entry points. Although these issues have been known for years, they remain the most common methods attackers use to succeed.

Three measures to disrupt the attack path

Unit 42 outlines three concrete steps for defenders. First: strict RBAC policies based on least privilege. Wildcard permissions allow attackers to access critical cluster resources through a single compromised pod. That one overly permissive account is often the deciding factor in large-scale attacks.

Second, Unit 42 recommends giving service account tokens a short lifespan. These tokens are typically valid indefinitely (!), which is ideal for attackers who take their time and go to great lengths to remain undetected. Gradually, they gather enough information to gain deep access without being noticed. By properly tying tokens to the lifespan of a pod, a stolen token quickly loses its value.

Third, it is important to run continuous runtime monitoring via an XDR platform. These solutions detect abnormal process behavior, unexpected network connections, and access to sensitive paths such as `/var/run/secrets/kubernetes.io/serviceaccount/token`. Audit logging is also often neglected, allowing attackers to remain undetected and leaving post-incident investigations lacking crucial information.

Unit 42 is highlighting this sore spot in Kubernetes this time, but it has recently identified many other cyber threats. Previously, the team published research on bypassing AI guardrails and mapped the impact of Iranian cyberattacks.

Tags:

Cloud Security / Kubernetes / North Korea / Palo Alto Networks / React2Shell / service account tokens / Slow Pisces / unit 42

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Iran lashes out on the digital front as attacks go global

What are the cyber threats to the Winter Olympics?

Editor picks

Workday is well prepared for the EU AI Act, who will follow?

Many organizations are facing a challenging deadline on August 2. The...

ASUS ZenScreen OLED MQ16FC review: high-fidelity mobility

The ASUS ZenScreen OLED MQ16FC is geared towards professionals on the...

‘Nvidia wants to acquire a PC manufacturer like Dell or HP’

A rumor suggests that Nvidia has been negotiating for over a year to ...

Runtime security becomes critical as AI accelerates threats

Security leaders face a substantial challenge as artificial intellige...

Techzine.tv

EU digital sovereignty and policy: Cisco's perspective

EU digital sovereignty and policy: Cisco's perspective

How to migrate from Redis to Valkey with zero downtime

How to migrate from Redis to Valkey with zero downtime

How Harness secures AI-generated code across the SDLC

How Harness secures AI-generated code across the SDLC

Cisco wants to tackle the 80-tool security problem

Cisco wants to tackle the 80-tool security problem

Read more on Security

Dutch ecommerce site Bol.com investigates claims of a data breach

Dutch ecommerce site Bol.com investigates claims of a data breach

A report from Dark Web Informer has raised questions about a possible data breach at Bol.com. On the platform...

Mels Dees 2 hours ago
NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result
Top story

NTT Research wants to accelerate innovation with Scale Academy: SaltGrain is the first result

Attribute-based encryption at the data layer

Sander Almekinders April 15, 2026
Security by Design prevents higher bills
Top story

Security by Design prevents higher bills

Those who build in security only after the fact pay up to fifteen times the original cost. That’s why a str...

Berry Zwets April 16, 2026
Vercel hit by attack via compromised AI tool

Vercel hit by attack via compromised AI tool

Vercel has announced that attackers gained access to internal systems. The attack began at Context.ai, an AI ...

Erik van Klinken 3 hours ago

Expert Talks

Anthropic’s Mythos preview: why the human layer matters more, not less

Anthropic’s Mythos preview: why the human layer matters more, not less

Anthropic has announced Anthropic’s Mythos Preview, a frontier mode...

Why SAST is growing in importance in the age of AI-generated source code

Why SAST is growing in importance in the age of AI-generated source code

Vibe coding is rising astonishingly quickly, but even developers who ...

Infosecurity Europe announces first wave of keynote speakers for 2026

Infosecurity Europe, the most influential information security event...

Better connected business technology is essential for prosperity in the Netherlands 

According to PwC, the Netherlands ranks fourth in Europe for producin...

Tech calendar

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Knowledge 26

May 5, 2026 Las Vegas

GISEC GLOBAL 2026

May 5, 2026 DUBAI

Red Hat Summit

May 11, 2026 Atlanta

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement