Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Home/Threats/Hackers Exploit Kubernetes Misconfigurations to Cloud Accounts
Threats

Hackers Exploit Kubernetes Misconfigurations to Cloud Accounts

Kubernetes has emerged as a cornerstone platform for managing containerized applications within enterprise environments. As its adoption expands, it’s also drawing heightened attention from...

David kimber
David kimber
April 7, 2026 3 Min Read
4 0

Kubernetes has emerged as a cornerstone platform for managing containerized applications within enterprise environments. As its adoption expands, it’s also drawing heightened attention from malicious actors.

Threat actors are now exploiting misconfigurations within Kubernetes clusters to break out of containers and move directly into the cloud accounts that host them.

Recent telemetry data shows that Kubernetes-related threat operations — including service account token theft — increased by 282% over the last year, with the information technology sector accounting for over 78% of all observed activity.

The attacks are calculated, not random. Adversaries are no longer simply trying to escape a single container. They are abusing weak identity configurations and overly permissive access controls to move from an initial foothold all the way into the core cloud infrastructure.

In roughly 22% of cloud environments monitored in 2025, suspicious activity tied to service account token theft was detected.

These incidents follow a clear pattern: gain code execution inside a container, extract mounted credentials, test API permissions, and pivot toward higher-value cloud resources.

Unit 42 researchers identified this growing threat through real-world intrusion cases, revealing how threat groups are chaining Kubernetes misconfigurations with cloud credential abuse to cause serious financial and operational harm.

Their findings trace a direct line from a single compromised container all the way to the core financial systems of targeted organizations.

Among the most alarming real-world examples is an intrusion tied to Slow Pisces, a North Korean state-sponsored group also tracked as Lazarus and TraderTraitor.

In mid-2025, this group targeted a cryptocurrency exchange after gaining persistence on a developer’s workstation through spearphishing.

Using the developer’s active, privileged cloud session, the attackers deployed a malicious pod directly into the production Kubernetes cluster.

That pod was built to expose the mounted service account token — a JSON Web Token (JWT) that Kubernetes automatically assigns to pods for authenticating with the API server.

Cryptocurrency Incident Flow with Kubernetes Compromise (Source - Unit42)
Cryptocurrency Incident Flow with Kubernetes Compromise (Source – Unit42)

The stolen token belonged to a high-privileged management service account with broad RBAC permissions.

Using this stolen identity, the threat actor authenticated to the Kubernetes API server, listed secrets, interacted with workloads across namespaces, and dropped a backdoor into a production pod to maintain persistent access.

A single misconfigured token, when stolen, can hand an attacker sweeping control over an entire cluster.

From Cluster to Cloud: Token Theft in Action

The attack did not stop at the cluster boundary. Using the privileges tied to the stolen token, the threat actor moved laterally from Kubernetes into the broader cloud platform.

They accessed backend systems, retrieved sensitive credentials, and reached the financial infrastructure of the exchange — resulting in millions stolen in cryptocurrency.

This mirrors the post-exploitation workflow modeled by Peirates, an open-source penetration testing framework demonstrating how stolen tokens enumerate secrets, pivot across namespaces, and query cloud metadata services.

Sample Peirates Menu Showing Available Post-Exploitation Techniques (Source - Unit42)
Sample Peirates Menu Showing Available Post-Exploitation Techniques (Source – Unit42)

A second major incident involved CVE-2025-55182, a critical flaw in React Server Components known as React2Shell.

Publicly disclosed on December 3, 2025, active exploitation targeting cloud services started within just two days.

Attackers abused insecure deserialization in the React Server Components flight protocol to achieve code execution inside application containers.

From there, they harvested service account tokens, queried the Kubernetes API, and collected cloud credentials from environment variables — pivoting into the cloud account to install backdoors and deploy cryptominers.

To reduce exposure, security teams should enforce least privilege through strict RBAC policies, avoiding wildcard permissions across service account roles.

Long-lived static tokens should be replaced with short-lived, projected service account tokens that expire automatically, cutting the value of any stolen credential.

Runtime monitoring tools that flag unusual process execution, unexpected outbound connections, and unauthorized access to sensitive system paths inside containers are also essential, as they can stop malicious activity before it escalates to the cloud layer.

Kubernetes audit logs must always be enabled and reviewed — they capture the earliest signs of API misuse, token access, and lateral movement across namespaces.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitHackerphishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Fake Gemini npm Package Steals Tokens From Claude, AI Tools

Next Post

BPFDoor Variants Evade Detection with Stateless C2 &

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us