A group of hackers has launched a new cryptojacking campaign on November 24, scanning as many as 59,000 IP networks to find Docker platforms that have API endpoints exposed online.
On November 26, it has been reported by ZDNet, a business technology publication, that the campaign is targeting vulnerable Docker instances in order to deploy crypto-malware to generate funds for the hacking group by mining Monero (XMR).
It has been analyzed that the mass scanning issue was first discovered by Bad Packets LLC, the American internet security firm, on November 25.
However, Troy Mursch, the Chief Research Officer and Co-founder of Bad Packets LLC, said that exploit activity targeting exposed Docker instances is not new and happens quite often.
Docker is a developer tool designed to simplify processes of creating, deploying and running software by using containers. Containers allow developers to package up an application with all of the required parts like libraries and other dependencies and deliver it as one package.
Likewise, Mursch, who reportedly discovered the campaign, told that once the hacking group manages to identify an exposed host, attackers deploy the API endpoint to start an Alpine Linux OS container to run a command that downloads and runs a Bash script from the attackers’ server. That script then reportedly installs a “classic XMRRig cryptocurrency miner.”
According to Mursch, hackers mined 14.82 XMR in the two days the Docker-targeting campaign has been active, which is worth $835 at press time.
So, in order to avoid the newly detected vulnerability, Mursch recommends that users who run Docker instances immediately check if they are exposing their API endpoints on the internet, close the ports, and terminate unrecognized running containers.
Source: zdnet.com | blog.usejournal.com | cointelegraph.com