Siloscape is a heavily obfuscated malware that emerged in 2021, specifically designed to exploit poorly configured Kubernetes clusters through Windows containers. It operates by planting backdoors within these clusters, enabling cybercriminals to steal data and user credentials. Siloscape's method involves creating a link to the host and then searching for two specific files: kubectl.exe and the Kubernetes config file, which are typically found on Kubernetes nodes. The malware uses the Tor proxy and an .onion domain to anonymously connect to its command and control (C2) server. Its unique approach includes obfuscating even simple API calls and using the Native API (NTAPI) version of the same function.
In the cybersecurity landscape, Siloscape was part of a larger campaign that included other malicious software such as the Hildegard trojan, Kaiten botnet, and XMRig Monero miner, all designed to exploit similar environments. Unlike most cloud malware that focuses primarily on resource hijacking and denial of service (DoS), Siloscape does not limit itself to any specific goal, demonstrating the flexibility and potential severity of its threat. If it encounters container security measures, it will exit, highlighting the importance of robust container security to prevent significant damage.
Fortunately, existing capabilities of Prisma Cloud have proven successful in detecting and mitigating the Siloscape malware. This includes blocking unzip.exe, the unzip binary Siloscape writes to the disk. The emergence and subsequent containment of Siloscape underscore the criticality of comprehensive cybersecurity measures in today's digital landscape, particularly in managing and securing Kubernetes clusters.
Description last updated: 2024-05-05T13:33:12.530Z