Back to Feed
Cloud SecurityApr 10, 2026

Understanding Current Threats to Kubernetes Environments

Unit 42 reports 282% surge in Kubernetes attacks exploiting tokens and CVE-2025-55182.

Summary

Unit 42 uncovered a significant increase in Kubernetes-targeted attacks, with threat actor operations involving token theft rising 282% year-over-year. The research details two attack patterns: stolen service account tokens enabling lateral movement across clusters, and exploitation of React2Shell (CVE-2025-55182) for remote code execution and credential theft. The IT sector accounted for 78% of observed activity, with attackers leveraging misconfigurations and overprivileged identities to escalate from container compromise to full cluster administrator access.

Full text

Threat Research CenterThreat ResearchMalware Malware Understanding Current Threats to Kubernetes Environments 20 min read Related ProductsAdvanced DNS SecurityAdvanced Threat PreventionAdvanced URL FilteringAdvanced WildFireCloud-Delivered Security ServicesCortexCortex CloudCortex XpanseNext-Generation FirewallUnit 42 Cloud Security AssessmentUnit 42 Incident Response By:Eyal RafianBill Batchelor Published:April 6, 2026 Categories:MalwareThreat Research Tags:Audit logsCloudContainersKubernetesPowerShellQueriesReact serverReact2shell Share Executive Summary The rapid adoption of container orchestration has positioned Kubernetes as a high-value target for adversaries seeking to compromise enterprise-scale environments. Our telemetry reveals that Kubernetes-related threat actor operations, including stealing Kubernetes tokens, increased 282% over the last year. The IT sector was the most heavily targeted, representing over 78% of observed activity. We look beyond traditional container escape scenarios, and demonstrate how high-profile threat actors abuse Kubernetes identities and exposed attack surfaces to escalate privileges, pivoting from initial access to sensitive backend cloud infrastructure. Using two real-world case studies, we break down the mechanics of these attacks and the tradecraft that made them possible: Stolen service account tokens: Suspicious activity related to potential service account token theft was observed in 22% of cloud environments in 2025. We explore how attackers compromised Kubernetes identities to move laterally from a production cluster into the core financial systems of a cryptocurrency exchange. React2Shell (CVE-2025-55182): Attacks targeting cloud services were observed within two days of the public disclosure of this critical vulnerability. We provide a breakdown of how threat actors exploited this public-facing application vulnerability to execute commands inside Kubernetes workloads. Leveraging this vulnerability, attackers were able to install backdoors and steal sensitive information, such as cloud credential files and database passwords. Together, these cases illustrate a common attack pattern: Exploiting misconfigurations or vulnerabilities to achieve remote code execution in the container. Stealing Kubernetes identities from the container. Using the stolen identities to escalate privileges across clusters and cloud services. We map these patterns to MITRE ATT&CK® techniques and examine threat actor tradecraft, to provide practical configuration, detection and monitoring strategies that disrupt attack paths before cluster-wide compromise occurs. Most security failures stem from misconfigured environments and overprivileged identities. To secure Kubernetes against attacks, defenders must implement validated settings, deep runtime visibility, and strictly limited permissions. These approaches help to transform Kubernetes from a potential exposure point into a highly resilient and defensible platform. Palo Alto Networks customers are better protected from the threats described in this article through the following products and services: Advanced WildFire Advanced URL Filtering and Advanced DNS Security Next-Generation Firewall with the Advanced Threat Prevention security subscription Cortex Xpanse is designed to identify exposed devices and applications on the public internet and escalate these findings to defenders. This includes devices vulnerable to CVE-2025-55182. Cortex Cloud has detection capabilities for cloud resource vulnerability and runtime operations discussed in this article. The Unit 42 Cloud Security Assessment is an evaluation service that reviews cloud infrastructure to identify misconfigurations and security gaps. If you think you might have been compromised or have an urgent matter, contact the Unit 42 Incident Response team. Related Unit 42 Topics Kubernetes, Cloud, Containers, Logging The Kubernetes Cloud Attack Surface Kubernetes is widely used to orchestrate microservice-based applications at scale. It provides automated deployment, service discovery and workload isolation across cloud environments. Like many open-source systems, Kubernetes is also a high-value attack surface that threat actors attempt to exploit in a variety of ways. Public-facing workloads that are exposed through ingress controllers and load balancers provide a potential entry point for application-layer exploitation. Misconfigurations in role-based access control (RBAC), pod security settings, and service account permissions can facilitate rapid post-exploitation escalation. After gaining remote code execution within a container, threat actors can directly interact with the Kubernetes API using the pod’s mounted service account token, often without triggering traditional perimeter defenses. Threat actors can leverage these misconfigurations and externally exposed services using a combination of opportunistic vulnerability exploitation, identity misuse and automation. The workflow of the attackers’ operations follows a distinct pattern: Enumerating the runtime environment Extracting service account tokens Testing API permissions Pivoting to higher-value workloads or cloud services When these operations are combined, even small misconfigurations – overly permissive tokens, exposed APIs, or insufficient workload and namespace isolation – could enable threat actors to gain full cluster administrator privileges by leveraging a single compromised pod. Threat Actor Activity Recently, Unit 42 researchers witnessed the increased use of Kubernetes clusters as operational infrastructure for credential theft, lateral movement and cloud-level compromise. The following cases demonstrate how stolen credentials and application-layer exploitation lead to similar post-exploitation workflows, leveraging Kubernetes identities to obtain access to sensitive backend systems. Case 1: Token Theft and Lateral Movement in a Crypto Platform In the middle of 2025, Unit 42 researchers witnessed an intrusion at a cryptocurrency exchange. This intrusion is connected to a campaign of recent cryptocurrency heists by the North Korean state-sponsored threat group known as Slow Pisces – also known as Lazarus and TraderTraitor. Earlier Campaign Activity This threat group's evolving capabilities were demonstrated in the February 2025 Bybit heist. Attackers stole approximately $1.5 billion in Ethereum (ETH), making this the largest digital theft in history. The tactics employed in this breach closely mirror identity-scraping techniques that are used to penetrate and pivot within cloud-native environments. In the Bybit operation, Slow Pisces actors targeted a developer at the exchange’s multi-signature platform provider and successfully exfiltrated AWS session tokens. By leveraging these stolen identity tokens, the group gained administrative access to the exchange’s cloud infrastructure. This unauthorized access allowed them to manipulate the platform’s smart contract and reroute massive volumes of financial assets. Slow Pisces was also suspected in the BitoPro Taiwanese cryptocurrency exchange intrusion in May 2025. Threat actors social-engineered a cloud‑operations employee, harvested AWS session tokens, and assumed privileged access within the company’s cloud environment. They then pushed malicious scripts to the hot‑wallet host and activated them during a maintenance window, enabling fraudulent transfers to blend in with routine operations. In both operations, Slow Pisces leveraged stolen cloud identity tokens to assume administrative roles, enabling direct control over smart contract logic and hot-wallet scripts. From One Exchange to Another In mid-2025, we observed a sophisticated intrusion at another cryptocurrency exchange. This attack involved a Kubernetes post-exploitation credential scraping operation that led to a cloud environment compromise and the theft of millions in cryptocurrency funds. While there is no indication that the Slow Pisces actor

Indicators of Compromise

  • cve — CVE-2025-55182
  • mitre_attack — T1528 (Steal Application Access Token)
  • mitre_attack — T1021 (Remote Services)

Entities

Palo Alto Networks (vendor)Cortex Xpanse (product)Cortex Cloud (product)Kubernetes (technology)RBAC (Role-Based Access Control) (technology)Service Account Tokens (technology)