{"id":1121449,"date":"2024-01-27T03:51:57","date_gmt":"2024-01-27T08:51:57","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/significant-security-loophole-found-in-google-software-container-system-the-record-from-recorded-future-news\/"},"modified":"2024-01-27T03:51:57","modified_gmt":"2024-01-27T08:51:57","slug":"significant-security-loophole-found-in-google-software-container-system-the-record-from-recorded-future-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/google\/significant-security-loophole-found-in-google-software-container-system-the-record-from-recorded-future-news\/","title":{"rendered":"&#8216;Significant security loophole&#8217; found in Google software container system &#8211; The Record from Recorded Future News"},"content":{"rendered":"<p><p>    Google has fixed a loophole affecting an important cloud    service after researchers discovered numerous organizations     including a publicly traded company  had systems vulnerable to    systemwide security breaches as a result of the issue.  <\/p>\n<p>    The issue affected Google Kubernetes Engine (GKE), a system    used to deploy, scale and manage how applications are    containerized. GKE  the tech giants implementation of the    open-source Kubernetes    project  is used widely in healthcare, education, retail    and financial services for data processing as well as    artificial intelligence and machine learning operations.  <\/p>\n<p>    Researchers from Orca Security explained that they     uncovered an issue in GKE that could allow an attacker    with any Google account to take over a misconfigured Kubernetes    cluster, potentially leading to serious security incidents such    as cryptomining, denial of service, and sensitive data theft.  <\/p>\n<p>    The issue revolves around permissions, with GKE allowing users    access to the system with any valid Google account. Orca    Security said this creates a significant security loophole    when administrators decide to bind this group with overly    permissive roles. The researchers are calling the loophole    Sys:All.  <\/p>\n<p>    Orca Security said it conducted scans and found over 1,300    clusters potentially exposed. More than 100 of them are exposed    enough to allow for widespread access.  <\/p>\n<p>    Kubernetes connects its hosted containerized apps with various    different types of critical data assets such as databases, code    repositories and other 3rd-party vendors, which makes it a    devastating tool at the hands of a malicious actor, they    noted.  <\/p>\n<p>    Containerization gives developers flexibility with how they    build and deploy software, by bundling an apps code with    everything else it needs  such as files and libraries  to    run on any    computing infrastructure.  <\/p>\n<p>    At least one of the exposed clusters belonged to a    Nasdaq-listed company, Orca Security said, and the exposure    would have given hackers access to Amazon Web Services    credentials enabling even deeper access to the companys    systems and data. A malicious actor could potentially access    these systems, extract or manipulate sensitive data, disrupt    services, or even move further into the network. the    researchers said.  <\/p>\n<p>    Orca Security said it reported the issue to the company and    worked with it to resolve the vulnerabilities, which involved    tightening the permissions, securing exposed cloud    buckets and more.  <\/p>\n<p>    The researchers reported exposure to several other owners that    they found were vulnerable, adding that in general,    organizations should always aim for granularity in the realm    of identity and access, so they dont give permissive access to    entities that don't need it.  <\/p>\n<p>    They also reported the issue to Google, which told them that it    recognizes the severity of the issue and has been proactive    with prevention measures and customer notifications, and    continues to take action to ensure customers safety.  <\/p>\n<p>    A Google spokesperson confirmed to Recorded Future News that it    worked with Orca Security. The tech giant also     released a security bulletin last week for the limited    number of impacted GKE users detailing the steps they should    take to protect themselves from any accidental authorization,    the spokesperson noted.  <\/p>\n<p>    Google also sent the bulletin in direct messages to some    customers.  <\/p>\n<p>    We have identified several clusters where users have granted    Kubernetes privileges to the system:authenticated group, which    includes all users with a Google account. These types of    bindings are not recommended, as they violate the principle of    least privilege and grant access to very large groups of    users, Google said in the advisory issued on January 19.  <\/p>\n<p>    Orca Security noted that Google considers this to be intended    behavior because in the end, this is an assigned permission    vulnerability that can be prevented by the user. Customers are    responsible for the access controls they configure.  <\/p>\n<p>    The researchers backed Googles assessment that organizations    should take responsibility and not deploy their assets and    permissions in a way that carries security risks and    vulnerabilities.  <\/p>\n<p>        Recorded Future      <\/p>\n<p>        Intelligence Cloud.      <\/p>\n<p>        No previous article      <\/p>\n<p>        No new articles      <\/p>\n<p>      Jonathan Greig    <\/p>\n<p>        Jonathan Greig is a Breaking News Reporter at Recorded        Future News. Jonathan has worked across the globe as a        journalist since 2014. Before moving back to New York City,        he worked for news outlets in South Africa, Jordan and        Cambodia. He previously covered cybersecurity at ZDNet and        TechRepublic.      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/therecord.media\/google-kubernetes-engine-security-loophole-access-permissions\" title=\"'Significant security loophole' found in Google software container system - The Record from Recorded Future News\">'Significant security loophole' found in Google software container system - The Record from Recorded Future News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google has fixed a loophole affecting an important cloud service after researchers discovered numerous organizations including a publicly traded company had systems vulnerable to systemwide security breaches as a result of the issue. The issue affected Google Kubernetes Engine (GKE), a system used to deploy, scale and manage how applications are containerized. GKE the tech giants implementation of the open-source Kubernetes project is used widely in healthcare, education, retail and financial services for data processing as well as artificial intelligence and machine learning operations <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/google\/significant-security-loophole-found-in-google-software-container-system-the-record-from-recorded-future-news\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[345634],"tags":[],"class_list":["post-1121449","post","type-post","status-publish","format-standard","hentry","category-google"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121449"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1121449"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121449\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1121449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1121449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1121449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}