Researchers have discovered a new type of malware that targets Windows containers to gain access to Kubernetes clusters.
Siloscape is a unique piece of malware since it focuses on Linux, a common operating system for administering cloud applications and environments.
Siloscape, first identified in March of this year, was given that name since its overall goal is to leave Windows containers via a server silo, according to Palo Alto Networks’ Unit 42.
Siloscape employs the Tor proxy and an.onion domain to connect to its command-and-control (C2) server, which is utilized by threat actors to administer their malware, data exfiltration, and issue commands, according to a blog published recently.
To Read More: ZDNet