Back to all scenarios
Scenario #297
Security
Kubernetes v1.25, GKE

Malicious Init Container Used for Reconnaissance

A pod was launched with a benign main container and a malicious init container that copied node metadata.

Find this helpful?
What Happened

Init container wrote node files (e.g., /etc/resolv.conf, cloud instance metadata) to an external bucket before terminating.

Diagnosis Steps
  • 1Enabled audit logs for object storage.
  • 2Traced writes back to a pod with suspicious init container.
  • 3Reviewed init container image – found embedded exfil logic.
Root Cause

Lack of validation on init container behavior.

Fix/Workaround
• Blocked unknown container registries via policy.
• Implemented runtime security agents to inspect init behavior.
Lessons Learned

Init containers must be treated as full-fledged security risks.

How to Avoid
  • 1Verify init container images and registries.
  • 2Use runtime tools (e.g., Falco) for behavior analysis.