Helping contact centers respond rapidly to customer concerns about COVID-19

As COVID-19 has spread globally, people are turning to governments, healthcare organizations, and other businesses with questions about their health and wellness, finances, and more. This sudden, unprecedented demand is putting strain on customer support resources, and many organizations are telling us that they’re struggling to respond to customers effectively during this critical time.If your organization is facing these challenges, you can respond to your customers’ questions related to COVID-19 and your business with Contact Center AI, which can provide a first line of response through 24/7 conversational self-service support via chat or over the phone. As speed is especially important, we’ve launched the Rapid Response Virtual Agent program, a quick way to get up and running with Contact Center AI.To learn how to launch a virtual agent (chat or voice) check out the documentation. It includes information on how to integrate Dialogflow Messenger, which provides a customizable chat dialog for your agent that can be embedded in your website so you can easily deploy your chatbot on the web and make it engaging with rich UI support.We’ve also made it easier to add COVID-19 content to your virtual agent with the ability to integrate open-source templates from organizations that have already launched similar initiatives. For example, Verily, in partnership with Google Cloud, has launched the Pathfinder virtual agent template for health systems and hospitals. It enables you to create chat or voice bots that answer questions about COVID-19 symptoms and provide the latest guidance from public health authorities like the Centers for Disease Control and Prevention and World Health Organization (WHO).Designed to help government agencies, healthcare and public health organizations, nonprofits, and businesses in other industries impacted by COVID-19, such as travel, financial services, and retail, Contact Center AI’s Rapid Response Virtual Agent program is available around the world in any of the 23 languages supported by Dialogflow. Because time is of the essence, we will be working with our contact center partners, as well with our various systems integrator and consulting partners, to help ensure these deployments and integrations happen quickly.Contact center partners include:8x8AvayaCiscoFive9GenesysMitelTwilioVonageSystem integrator partners include:AccentureDeloitte Consulting LLPInfosysKPMGHCLTCSWiproMaven WaveQuantiphiSADASpringMLSome organizations have already begun working to create a resource to help with customer needs:Oklahoma Employment Security Commission”The Oklahoma Employment Security Commission has been experiencing unprecedented call volumes (over 60,000 daily) as a result of unemployment claims related to the COVID-19 pandemic. Contact Center AI, integrated into the commission’s website, is aiding with call diversion, helping reduce wait times, and providing the commission with an additional channel for addressing unemployment related questions.” – David Ostrowe, Secretary of Digital Transformation and Administration, Oklahoma StateUniversity of Pennsylvania“It’s been an amazing, collaborative effort getting this quickly created and launched, and we are grateful to the Google Cloud/Verily teams for their efforts. We are seeing a lot of people looking for an authoritative source of information, and being able to scale to meet the demand helps us disseminate accurate information more quickly.”We will use this both to help answer common questions and to assess symptoms and help with triage to make sure people are routed to the most appropriate clinical intake level. As the number of patients with concerns grows, we expect that having an automated and validated way of addressing inquiries will be an important part of ensuring the highest possible quality of response to concerns of different individuals. We will route patients with concerning symptoms to confer directly with a member of our clinical team while addressing more routine or lower acuity questions through the bot.” – Kevin G. Volpp, MD, PhD, Director, Center for Health Incentives and Behavioral Economics (CHIBE), University of PennsylvaniaThe work we’re doing today is part of our focus on helping businesses and organizations most impacted by the COVID-19 pandemic. As Google CEO Sundar Pichai and Google Cloud CEO Thomas Kurian explained in recent blog posts, our goal is to help people stay safe, informed, and connected during these extraordinary times. For more information on the Rapid Response Virtual Agent program, please see our website and the documentation on how to deploy your own virtual agent. Existing customers can contact your Google Cloud account manager, your contact center, or systems integration partners for assistance.
Quelle: Google Cloud Platform

Detect large-scale cryptocurrency mining attack against Kubernetes clusters

Azure Security Center's threat protection enables you to detect and prevent threats across a wide variety of services from Infrastructure as a Service (IaaS) layer to Platform as a Service (PaaS) resources in Azure, such as IoT, App Service, and on-premises virtual machines.

At Ignite 2019 we announced new threat protection capabilities to counter sophisticated threats on cloud platforms, including preview for threat protection for Azure Kubernetes Service (AKS) Support in Security Center and preview for vulnerability assessment for Azure Container Registry (ACR) images.

Azure Security Center and Kubernetes clusters 

In this blog, we will describe a recent large-scale cryptocurrency mining attack against Kubernetes clusters that was recently discovered by Azure Security Center. This is one of the many examples Azure Security Center can help you protect your Kubernetes clusters from threats.

Crypto mining attacks in containerized environments aren’t new. In Azure Security Center, we regularly detect a wide range of mining activities that run inside containers. Usually, those activities are running inside vulnerable containers, such as web applications, with known vulnerabilities that are exploited.

Recently, Azure Security Center detected a new crypto mining campaign that targets specifically Kubernetes environments. What differs this attack from other crypto mining attacks is its scale: within only two hours a malicious container was deployed on tens of Kubernetes clusters.

The containers ran an image from a public repository: kannix/monero-miner. This image runs XMRig, a very popular open source Monero miner.

The telemetries showed that container was deployed by a Kubernetes Deployment named kube-control.

As can be shown in the Deployment configuration below, the Deployment, in this case, ensures that 10 replicas of the pod would run on each cluster:

In addition, the same actor that deployed the crypto mining containers also enumerated the cluster resources including Kubernetes secrets. This might lead to exposure of connection strings, passwords, and other secrets which might enable lateral movement.

The interesting part is that the identity in this activity is system:serviceaccount:kube-system:kubernetes-dashboard which is the dashboard’s service account.
This fact indicates that the malicious container was deployed by the Kubernetes dashboard. The resources enumeration was also initiated by the dashboard’s service account.

There are three options for how an attacker can take advantage of the Kubernetes dashboard:

Exposed dashboard: The cluster owner exposed the dashboard to the internet, and the attacker found it by scanning.
The attacker gained access to a single container in the cluster and used the internal networking of the cluster for accessing the dashboard (which is possible by the default behavior of Kubernetes).
Legitimate browsing to the dashboard using cloud or cluster credentials.

The question is which one of the three options above was involved in this attack? To answer this question, we can use a hint that Azure Security Center gives, security alerts on the exposure of the Kubernetes dashboard. Azure Security Center alerts when the Kubernetes dashboard is exposed to the Internet. The fact that this security alert was triggered on some of the attacked clusters implies that the access vector here is an exposed dashboard to the Internet.

A representation of this attack on the Kubernetes attack matrix would look like:

 

Avoiding cryptocurrency mining attacks

How could this be avoided?

Do not expose the Kubernetes dashboard to the Internet: Exposing the dashboard to the Internet means exposing a management interface.
Apply RBAC in the cluster: When RBAC is enabled, the dashboard’s service account has by default very limited permissions which won’t allow any functionality, including deploying new containers.
Grant only necessary permissions to the service accounts: If the dashboard is used, make sure to apply only necessary permissions to the dashboard’s service account. For example, if the dashboard is used for monitoring only, grant only “get” permissions to the service account.
Allow only trusted images: Enforce deployment of only trusted containers, from trusted registries.

Learn more

Kubernetes is quickly becoming the new standard for deploying and managing software in the cloud. Few people have extensive experience with Kubernetes and many only focuses on general engineering and administration and overlook the security aspect. Kubernetes environment needs to be configured carefully to be secure, making sure no container focused attack surface doors are not left open is exposed for attackers. Azure Security Center provides:

Discovery and Visibility: Continuous discovery of managed AKS instances within Security Center’s registered subscriptions.
Secure Score recommendations: Actionable items to help customers comply with security best practices in AKS as part of the customer’s Secure Score, such as "Role-Based Access Control should be used to restrict access to a Kubernetes Service Cluster."
Threat Detection: Host and cluster-based analytics, such as “A privileged container detected."

To learn more about AKS Support in Azure Security Center, please visit the documentation here.
Quelle: Azure