Breaking: Unit 42 Reports Escalating Kubernetes Attacks
Researchers at Unit 42 have uncovered a significant escalation in attacks targeting Kubernetes environments. Threat actors are increasingly exploiting identities and critical vulnerabilities to compromise cloud-native infrastructures, according to a new report from the cybersecurity firm.

The findings indicate a shift in tactics, with attackers focusing on weak identity configurations and unpatched security flaws to gain initial access and move laterally within clusters.
Key Findings
Exploitation of Identities
Unit 42 observed that many attacks leverage overly permissive role-based access control (RBAC) and misconfigured service accounts. These allow adversaries to escalate privileges and persist within the environment.
“Attackers are no longer just scanning for exposed dashboards—they’re systematically abusing identity and access management gaps,” said a Unit 42 senior threat researcher.
Critical Vulnerabilities in Focus
The report details several CVEs that have been actively weaponized in the wild, including those in API servers and container runtimes. Unit 42 emphasizes that timely patching remains a major challenge.
“We’re seeing a 300% increase in attempts to exploit known Kubernetes vulnerabilities compared to last quarter,” the researcher added.
Background
Kubernetes has become the de facto standard for container orchestration, powering a vast majority of cloud-native applications. Its popularity has made it a prime target for cybercriminals and state-sponsored groups alike.

The rise of hybrid and multi-cloud deployments has expanded the attack surface, particularly in environments where security best practices are not consistently enforced.
What This Means
Organizations must prioritize identity governance and vulnerability management within their Kubernetes deployments. Unit 42 recommends regular audits of RBAC policies, enforcement of least-privilege principles, and automated patch workflows.
“The cloud is not inherently secure—it’s a shared responsibility. Teams need to treat Kubernetes identities as the new perimeter,” the report concludes.
Mitigation Steps
- Review RBAC assignments and remove unused or over-permissive roles.
- Enable continuous vulnerability scanning for container images and cluster components.
- Implement network policies to restrict east-west traffic.
- Use managed Kubernetes services with default security controls where possible.
For a deeper dive, see the Background section above and the What This Means section.