For this project I looked at two different types of cybersecurity in the news. The first one was malware with the example I used being decoy dog. The second one was hacking with the example I used being RBAC. I also passed the cybersecurity training for CCBC.
The article starts with showing the proof that the Kubernetes Cluster with their API server being incorrectly configured. Other proof that the Kubernetes Cluster was being hacked with removing existing deployments such as api-proxy and worker development. The article talks next about how the hackers attacked the cluster with using RBAC to acquire persistence. The hackers had use an image named kuberntesio/kube-controller to distribute containers on a call. The article ends with talking about the hacking technique known as K8s which exploit API servers to construct a Cluster Role Binding to acquire full access to a cluster.
Mike Stevens
Information Security Newspaper
4/21/2023
This article was very accurate with getting to the facts about what happened and expalained the dangers of RBAC and foreign images acc
The purpose of this I feel is to warn people about the dangers of RBAC and foreign images.
Stevens, M. (2023, April 21). RBAC buster – a new K8s attack technique to hack in Kubernetes Cluster. Information Security Newspaper | Hacking News. Retrieved April 26, 2023, from https://www.securitynewspaper.com/2023/04/21/rbac-buster-a-new-k8s-attack-technique-to-hack-in-kubernetes-cluster/
The article first talked a malware known as decoy dog that has discovered as a form of malware. With the use of decoy dog being to evade standard cyber security protections through establishing a good realitionship with security vendors. Infoblox does say that decoy dog is very rare which leads to discovering other forms of decoy dog such as C2 and Puppy Rat. The Investigation did find the origin of decoy dog to be found in Russia in April of 2022. The article ends with saying that decoy dog is a very recent discovery and will more information on it in the future.
Bill Toulas
Bleeping Computer
4/23/2023
This source provided the reader with accurate information about the dangers and risks of decoy dog and its other forms such as C2 and puppy rat.
The purpose of this article was to inform readers about deocy dog and too make sure the viewer does not have panic attacks about decoy dog
Toulas, B. (2023, April 23). Decoy dog malware toolkit found after analyzing 70 billion DNS queries. BleepingComputer. Retrieved April 26, 2023, from https://www.bleepingcomputer.com/news/security/decoy-dog-malware-toolkit-found-after-analyzing-70-billion-dns-queries/
I learned about many things within the course of this unit. I learned about the dangers of malware and hacking. I learned how to protect myself from malware and hacking and not to get too worked up over it. I learned how CCBC protect its database from cyber attacks. I learned different google search engines such as google news in order to get only news. I learned that every career that requires computers is going to require me to take cyber security training.