SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access and Monitoring For Data Centres

    KentixONE – IoT Access and Monitoring For Data Centres

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • EnGenius security boosts Crossroads Church safety
    • PSIA releases new PKOC explainer video
    • ICT expands in CEE region with new sales director
    • Zimperium's zLabs reveals advanced DroidLock ransomware
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why open matters in the age of AI
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    IFSEC India 2025

    IFSEC India 2025

    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Mobile access
  • Home
  • About
  • Products
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • White papers

Check out our special report on casino security

Get it now!

Aqua Security’s new research report uncovers the evolving techniques targeting cloud native environments

21 Apr 2022

Aqua Security’s new research report uncovers the evolving techniques targeting cloud native environments
Contact company
Contact Aqua Security
icon Add as a preferred source Download PDF version
Related Links
  • ACaaS — The future of access control systems

Aqua Security, the globally renowned pure-play cloud native security provider, has published new research from Aqua’s threat research team, Nautilus, which demonstrates attackers are finding new ways to target cloud native environments.

The research shows that adversaries are adopting more sophisticated techniques, leveraging multiple attack components and shifting attention to Kubernetes and the software supply chain.

Aqua’s new research report

The ‘2022 Cloud Native Threat Report: Tracking Software Supply Chain and Kubernetes Attacks and Techniques’ offers insight on trends and key takeaways for practitioners about the cloud native threat landscape.

Research revealed that adversaries are engaging with new tactics, techniques and procedures (TTPs), to specifically target cloud native environments. While cryptominers were the most common malware observed, with increasing frequency, Team Nautilus discovered an increased usage of backdoors, rootkits and credential stealers — signs that intruders have more than cryptomining in their plans.

Backdoors, a major cause of attacks

Threat actors also broadened their targets to include CI/CD and Kubernetes environments

Backdoors, which permit a threat actor to access a system remotely and are used to establish persistence in the compromised environment, were encountered in 54% of attacks (up 9% compared with 2020). Additionally, half of the malicious container images (51%) analysed by researchers contained worms, which allow attackers to increase the scope of their attack with minimal effort (up 10% compared with 2020).

Notably, threat actors also broadened their targets to include CI/CD and Kubernetes environments. In 2021, 19% of the malicious container images analysed targeted Kubernetes, including kubelets and API servers, up 9% compared with the previous year.

Growing attacks on cloud native environments

“These findings underscore the reality that cloud native environments now represent a target for attackers, and that the techniques are always evolving,” said Assaf Morag, Threat Intelligence and Data Analyst Lead at Aqua Security’s Team Nautilus, adding “The broad attack surface of a Kubernetes cluster is attractive for threat actors, and then once they are in, they are looking for low-hanging fruit.”

Other key findings of the research include:

  • The proportion and variety of observed attacks targeting Kubernetes has increased and this includes a wider adoption of the weaponisation of Kubernetes UI tools.
  • Supply chain attacks represent 14.3% of the particular sample of images from public image libraries, showing that these attacks continue to be an effective method of attacking cloud native environments.
  • The Log4j zero-day vulnerability was immediately exploited in the wild. Team Nautilus detected multiple malicious techniques, including known malware, fileless execution, reverse shell executions and files that were downloaded and executed from memory — all emphasizing the need for run-time protection.
  • Researchers observed honeypot attacks by TeamTNT, after the group announced its retirement in December 2021. However, no new tactics have been in use, so it is unclear if the group is still in operation or if the ongoing attacks originated from automated attack infrastructure. Regardless, enterprise teams should continue preventative measures against these threats.

Use of honeypots to investigate attacks

Team Nautilus utilised Aqua’s Dynamic Threat Analysis (DTA) product to analyse each attack

Aqua’s Team Nautilus made extensive use of honeypots to investigate attacks in the wild and to investigate supply chain attacks against cloud native applications, the team examined images and packages from public registries and repositories, such as DockerHub, NPM and Python Package Index.

Team Nautilus utilised Aqua’s Dynamic Threat Analysis (DTA) product to analyse each attack. Aqua DTA is the industry’s first container sandbox solution that dynamically assesses container image behaviours to determine whether they harbor hidden malware. This enables organisations to identify and mitigate attacks that static malware scanners cannot detect.

Security solutions purpose-built for cloud native environments

“The key takeaway from this report is that attackers are highly active — more than ever before — and more frequently targeting vulnerabilities in applications, open source and cloud technology,” said Morag, adding “Security practitioners, developers and DevOps teams must seek out security solutions that are purpose-built for cloud native. Implementing proactive and preventative security measures will allow for stronger security and ultimately protect environments.”

To ensure cloud environments are secure, Aqua’s Team Nautilus recommends implementing runtime security measures, a layered approach to Kubernetes security and scanning in development.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Electronic security systems
  • Office security systems
  • Office security
  • Application security
  • Physical security
  • Commercial security
  • Perimeter security
  • Private sector security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security access systems
  • Asset tracking
  • Electronic access control
  • Identity management
  • Building security
  • Facility security
  • Door access control
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Internet of Things (IoT)
  • Data Security
  • Incident Management
  • Security Assessments
  • Cloud security
  • Artificial intelligence (AI)
  • Mobile access
  • Machine Learning
  • Touchless Security
  • Related links
  • HID Access control software
  • Access Control Software Access control software
  • Standalone / Networked Access control systems & kits
  • Proximity Access control systems & kits
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • High Level Interface Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control systems & kits
  • Access control software
Related white papers
The 2024 state of physical access trend report

The 2024 state of physical access trend report

Download
The truth behind 9 mobile access myths

The truth behind 9 mobile access myths

Download
6 good reasons to embrace mobile credentialing

6 good reasons to embrace mobile credentialing

Download
Related articles
City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

City workers can now add their employee badge to Apple wallet and gain office access via iPhone or Apple watch

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID provides their mobile access and Bluetooth readers at the new Skyliner skyscraper in Warsaw

HID Global hails the renewed promise of mobile access

HID Global hails the renewed promise of mobile access

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Mobile access
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec