Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.
Prepare to Be Boarded - A Tale of Kubernetes Plunder and Cryptobooty