The Scarleteel risk targets AWS Fargate environments for information theft and extra malicious varieties of assaults corresponding to cryptojacking and DDoS. Learn to mitigate this risk.

Sysdig, a cloud and container safety firm, has launched a new report on the Scarleteel risk that targets particular AWS environments for information theft and extra malicious actions. Learn the way the Scarleteel risk operates and the way to safe what you are promoting from this risk.
Soar to:
What’s the Scarleteel risk?
Scarleteel is a complicated assault on AWS cloud environments that was found in February 2023 by Sysdig. That operation began by compromising Kubernetes containers to unfold to the sufferer’s AWS account with one aim in thoughts: stealing proprietary software program. The assault additionally dropped a cryptominer on the compromised atmosphere, but Sysdig’s Menace Analysis Group estimated the cryptojacking operation was in all probability used as a decoy to evade the detection of the information theft operation.
The assault confirmed that the risk actor had strong data of AWS cloud mechanics together with Elastic Compute Cloud roles, lambda serverless capabilities and Terraform, an open-source infrastructure as code software that is ready to automate operations on infrastructures on any type of cloud answer.
Scarleteel’s new operation
Scarleteel’s Techniques, Strategies and Procedures has improved, in accordance with the Sysdig Menace Analysis Group. As within the earlier operation, the ultimate aim of the risk actor right here appears to be information theft, though the actor nonetheless vegetation cryptominers throughout its assault (Determine A).
Determine A

How Scarleteel targets AWS Fargate credentials
This time, the assault begins with the risk actor exploiting JupyterLab pocket book containers deployed in a Kubernetes cluster. Then, the attacker focuses on credential stealing, utilizing a number of scripts to attempt to get AWS Fargate credentials within the occasion metadata service (IMDSv1 and IMDSv2) within the filesystem and within the Docker containers created within the focused machine. The stolen credentials are despatched to an IP deal with that was beforehand utilized by Scarleteel.
The attacker managed to steal AWS credentials in containers that have been utilizing IMDSv1. IMDSv2 password theft extremely will depend on the precise atmosphere. Relying on the configuration, it won’t be attainable for an attacker to steal credentials on IMDSv2.
To evade detections based mostly on using the curl and wget command-line instruments, which are sometimes monitored by safety options, the risk actor determined to make use of a customized script to exfiltrate the obtained credentials (Determine B). The info is base64-encoded, so it wouldn’t be despatched as clear textual content.
Determine B

As soon as the attacker is in possession of the credentials, they set up the AWS Command-Line Interface with Pacu, an open-source AWS exploitation framework designed for offensive safety testing.
The attacker then used the AWS CLI to hook up with Amazon S3-compatible Russian methods utilizing the –endpoint-url choice, which permits the attackers to obtain their instruments and exfiltrate information with out being logged by the sufferer’s CloudTrail.
After the risk actor performed automated reconnaissance within the goal’s AWS atmosphere, they obtained admin entry and created a person named “aws_support,” switching to it to proceed the operation.
How Scarleteel targets Kubernetes
The risk actor actively targets Kubernetes within the sufferer’s atmosphere. The attacker has used Peirates, a Kubernetes penetration software that allows an attacker to escalate privileges and pivot by means of a Kubernetes cluster. It additionally automates recognized strategies to steal and gather tokens and secrets and techniques.
The risk actor additionally executed Pandora, a Mirai-like malware that runs DDoS assaults utilizing Linux methods and IoT methods to particular targets. As said by the researchers, “This assault is probably going a part of a DDoS-as-a-Service marketing campaign, the place the attacker offers DDoS capabilities for cash.”
Cryptojacking presumably used as a decoy
Through the assault, the risk actor created 42 cases of the XMRig cryptominer, which is a authentic software usually used by attackers in cryptojacking operations. This large variety of cases all operating the miner was caught rapidly, however the risk actor then created different accounts to realize the identical function by stealing secrets and techniques from the Secret Supervisor or updating SSH keys to run new cases. It failed attributable to inadequate privileges.
It’s intriguing to see a risk actor operating a stealth operation immediately begin such a loud exercise. This as soon as once more leads us to consider that the cryptomining a part of the operation may simply be a decoy to cover all the information theft exercise.
Tips on how to defend from this cybersecurity risk
- Container photos ought to all the time come from trusted sources and continuously up to date with the newest safety patches.
- Pointless providers ought to all the time be disabled so the assault floor isn’t elevated. Privileges also needs to be minimized, and useful resource limitations needs to be enforced.
- Utilizing AWS IMDSv2 as a substitute of IMDSv1 is a advisable safety greatest apply for containers as a result of it makes credential stealing more durable for attackers, relying on the configuration.
- AWS Identification and Entry Administration position permissions needs to be fastidiously checked.
- Safety scanning instruments needs to be used to determine vulnerabilities and malware in container photos.
- Exact inbound and outbound insurance policies needs to be deployed to restrict entry to solely vital duties. AWS CloudTrail logs needs to be analyzed for any suspicious exercise.
- Multifactor authentication needs to be deployed for connecting to AWS accounts.
Disclosure: I work for Development Micro, however the views expressed on this article are mine.
