Kubernetes Security Guide: Risks, Strategies, And Tools
In 2018, attackers gained access to Tesla’s AWS cloud environment through an unprotected Kubernetes console (admin console). Because it lacked proper authentication, the hackers could see and control cluster resources. Once inside, they deployed new pods running cryptocurrency mining software, using Tesla’s compute power for profit. During the breach, the attackers also uncovered credentials stored in the cluster.