Blog | G5 Cyber Security

Attack Vector

In 2021, container attacks have been on the rise. We observed numerous attacks that were designed to escape container environments to the underlying host, increasing the impact of the attack. An attacker, who manages to run malicious code on a cluster can, with no special permissive permissions, successfully spoof DNS responses to all the applications running on the cluster, and from there execute a MITM (Man In The Middle) on all network traffic of pods. Weve heard many accounts of attempted (sometimes successful) attacks.”]

Source: https://blog.aquasec.com/topic/attack-vector

Exit mobile version