{"id":24346,"date":"2024-04-17T21:00:46","date_gmt":"2024-04-18T05:00:46","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/04\/17\/news-18076\/"},"modified":"2024-04-17T21:00:46","modified_gmt":"2024-04-18T05:00:46","slug":"news-18076","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/04\/17\/news-18076\/","title":{"rendered":"Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Wed, 17 Apr 2024 16:00:00 +0000<\/strong><\/p>\n<p>Attackers are constantly seeking new vulnerabilities to compromise Kubernetes environments. Microsoft recently uncovered an attack that exploits new critical vulnerabilities in OpenMetadata to gain access to Kubernetes workloads and leverage them for cryptomining activity.<\/p>\n<p>OpenMetadata is an open-source platform designed to manage metadata across various data sources. It serves as a central repository for metadata lineage, allowing users to discover, understand, and govern their data. On March 15, 2024, several vulnerabilities in OpenMetadata platform were published. These vulnerabilities (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28255\">CVE-2024-28255<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28847\">CVE-2024-28847<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28253\">CVE-2024-28253<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28848\">CVE-2024-28848<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28254\">CVE-2024-28254<\/a>), affecting versions prior to 1.3.1, could be exploited by attackers to bypass authentication and achieve remote code execution. Since the beginning of April, we have observed exploitation of this vulnerability in Kubernetes environments.<\/p>\n<p>Microsoft highly recommends customers to check clusters that run OpenMetadata workload and make sure that the image is up to date (version 1.3.1 or later). In this blog, we share our analysis of the attack, provide guidance for identifying vulnerable clusters and using Microsoft security solutions like Microsoft Defender for Cloud to detect malicious activity, and share indicators of compromise that defenders can use for hunting and investigation.<\/p>\n<h2 class=\"wp-block-heading\" id=\"attack-flow\">Attack flow<\/h2>\n<p>For initial access, the attackers likely identify and target Kubernetes workloads of OpenMetadata exposed to the internet. Once they identify a vulnerable version of the application, the attackers exploit the mentioned vulnerabilities to gain code execution on the container running the vulnerable OpenMetadata image.<\/p>\n<p>After establishing a foothold, the attackers attempt to validate their successful intrusion and assess their level of control over the compromised system. This reconnaissance step often involves contacting a publicly available service. In this specific attack, the attackers send ping requests to domains that end with <em>oast[.]me<\/em> and <em>oast[.]pro<\/em>, which are associated with Interactsh, an open-source tool for detecting out-of-band interactions.<\/p>\n<p>OAST domains are publicly resolvable yet unique, allowing attackers to determine network connectivity from the compromised system to attacker infrastructure without generating suspicious outbound traffic that might trigger security alerts. This technique is particularly useful for attackers to confirm successful exploitation and validate their connectivity with the victim, before establishing a command-and-control (C2) channel and deploying malicious payloads.<\/p>\n<p>After gaining initial access, the attackers run a series of reconnaissance commands to gather information about the victim environment. The attackers query information on the network and hardware configuration, OS version, active users, etc.<\/p>\n<p>As part of the reconnaissance phase, the attackers read the environment variables of the workload. In the case of OpenMetadata, those variables might contain connection strings and credentials for various services used for OpenMetadata operation, which could lead to lateral movement to additional resources.<\/p>\n<p>Once the attackers confirm their access and validate connectivity, they proceed to download the payload, a cryptomining-related malware, from a remote server. We observed the attackers using a remote server located in China. The attacker\u2019s server hosts additional cryptomining-related malware that are stored, for both Linux and Windows OS.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig1-Additional-cryptomining-malware-server.webp\" alt=\"Screenshot of attacker's server showing cryptomining-related malware\" class=\"wp-image-134002 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig1-Additional-cryptomining-malware-server.webp\"><figcaption class=\"wp-element-caption\">Figure 1. Additional cryptomining-related malware in the attacker&rsquo;s server<\/figcaption><\/figure>\n<p>The downloaded file&#8217;s permissions are then elevated to grant execution privileges. The attacker also added a personal note to the victims:<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note-1024x196.webp\" alt=\"Screenshot of note from attacker\" class=\"wp-image-134003 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note-1024x196.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note-300x57.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note-768x147.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note.webp 1215w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig2-note-1024x196.webp\"><figcaption class=\"wp-element-caption\">Figure 2. Note from attacker<\/figcaption><\/figure>\n<p>Next, the attackers run the downloaded cryptomining-related malware, and then remove the initial payloads from the workload.<strong> <\/strong>Lastly, for hands-on-keyboard activity, the attackers initiate a reverse shell connection to their remote server using <em>Netcat<\/em> tool, allowing them to remotely access the container and gain better control over the system. Additionally, for persistence, the attackers use <em>cronjobs<\/em> for task scheduling, enabling the execution of the malicious code at predetermined intervals.<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-to-check-if-your-cluster-is-vulnerable\">How to check if your cluster is vulnerable<\/h2>\n<p>Administrators who run OpenMetadata workload in their cluster need to make sure that the image is up to date. If OpenMetadata should be exposed to the internet, make sure you use strong authentication and avoid using the default credentials.<\/p>\n<p>To get a list of all the images running in the cluster:<\/p>\n<div class=\"wp-block-syntaxhighlighter-code \">\n<pre class=\"brush: plain; gutter: false; title: ; notranslate\"> kubectl get pods --all-namespaces -o=jsonpath=&#039;{range .items&#x5B;*]}{.spec.containers&#x5B;*].image}{&quot;n&quot;}{end}&#039; | grep &#039;openmetadata&#039; <\/pre>\n<\/div>\n<p>If there is a pod with a vulnerable image, make sure to update the image version for the latest version<em>.<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"how-microsoft-defender-for-cloud-capabilities-can-help\">How Microsoft Defender for Cloud capabilities can help<\/h2>\n<p>This attack serves as a valuable reminder of why it&#8217;s crucial to stay compliant and run fully patched workloads in containerized environments. It also highlights the importance of a comprehensive security solution, as it can help detect malicious activity in the cluster when a new vulnerability is used in the attack. In this specific case, the attackers&#8217; actions triggered <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-containers-introduction\">Microsoft Defender for Containers<\/a> alerts, identifying the malicious activity in the container. In the example below, Microsoft Defender for Containers alerted on an attempt to initiate a reverse shell from a container in a Kubernetes cluster, as happened in this attack:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig3-Microsoft-Defender-for-Containers-alert.webp\" alt=\"Screenshot of Microsoft Defender Containers alert for detection of potential reverse shell\" class=\"wp-image-134004 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/04\/Fig3-Microsoft-Defender-for-Containers-alert.webp\"><figcaption class=\"wp-element-caption\">Figure 3. Microsoft Defender for Containers alert for detection of potential reverse shell<\/figcaption><\/figure>\n<p>To prevent such attacks, Microsoft Defender for Containers provides agentless vulnerability assessment for Azure, AWS, and GCP, allowing you to identify vulnerable images in the environment, before the attack occurs.&nbsp; <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/tutorial-enable-cspm-plan\">Microsoft Defender Cloud Security Posture Management (CSPM)<\/a> can help to prioritize the security issues according to their risk. For example, Microsoft Defender CSPM highlights vulnerable workloads exposed to the internet, allowing organizations to quickly remediate crucial threats.<\/p>\n<p>Organizations can also monitor Kubernetes clusters using Microsoft Sentinel via Azure Kubernetes Service (AKS) solution for Sentinel, which enables detailed audit trail for user and system actions to identify malicious activity.<\/p>\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise-iocs\">Indicators of compromise (IoCs)<\/h2>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td><strong>Type<\/strong><\/td>\n<td><strong>IoC<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Executable SHA-256<strong><\/strong><\/td>\n<td>7c6f0bae1e588821bd5d66cd98f52b7005e054279748c2c851647097fa2ae2df<\/td>\n<\/tr>\n<tr>\n<td>Executable SHA-256<\/td>\n<td>19a63bd5d18f955c0de550f072534aa7a6a6cc6b78a24fea4cc6ce23011ea01d<\/td>\n<\/tr>\n<tr>\n<td>Executable SHA-256<\/td>\n<td>31cd1651752eae014c7ceaaf107f0bf8323b682ff5b24c683a683fdac7525bad<\/td>\n<\/tr>\n<tr>\n<td>IP<\/td>\n<td>8[.]222[.]144[.]60<\/td>\n<\/tr>\n<tr>\n<td>IP<\/td>\n<td>61[.]160[.]194[.]160<\/td>\n<\/tr>\n<tr>\n<td>IP<\/td>\n<td>8[.]130[.]115[.]208<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><em><strong>Hagai Ran Kestenberg<\/strong>, Security Researcher<br \/><strong>Yossi Weizman<\/strong>, Senior Security Research Manager<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog:&nbsp;<a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n<p>To get notified about new publications and to join discussions on social media, follow us on LinkedIn at <a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence\">https:\/\/www.linkedin.com\/showcase\/microsoft-threat-intelligence<\/a>, and on X (formerly Twitter) at&nbsp;<a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n<p>To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: <a href=\"https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence\">https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence<\/a>.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/17\/attackers-exploiting-new-critical-openmetadata-vulnerabilities-on-kubernetes-clusters\/\">Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/17\/attackers-exploiting-new-critical-openmetadata-vulnerabilities-on-kubernetes-clusters\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Wed, 17 Apr 2024 16:00:00 +0000<\/strong><\/p>\n<p>Microsoft recently uncovered an attack that exploits new critical vulnerabilities in OpenMetadata to gain access to Kubernetes workloads and leverage them for cryptomining activity.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/17\/attackers-exploiting-new-critical-openmetadata-vulnerabilities-on-kubernetes-clusters\/\">Attackers exploiting new critical OpenMetadata vulnerabilities on Kubernetes clusters<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[16598],"class_list":["post-24346","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cryptocurrency-mining"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24346"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24346\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}