Rui Vasconcelos
on 12 June 2020
Microsoft exposes attacks to Kubeflow deployments

Microsoft publishes report detailing series of attacks against clusters running Kubeflow with the purpose of mining cryptocurrencies. To ensure that you are on the safe side, follow the steps below:
1. When deploying Kubeflow, make sure that its dashboard isn’t exposed to the internet: check the type of the Istio ingress service by the following command and make sure that it is not a load balancer with a public IP:
kubectl get service istio-ingressgateway -n istio-system
2. Verify that the malicious container is not deployed in the cluster, through the following command:
kubectl get pods –all-namespaces -o jsonpath=”{.items[*].spec.containers[*].image}” | grep -i ddsfdfsaadfs
Find out more about this news – ZDNet, threatpost