Recent Malware Aims at Unprotected Docker APIs for Mining Cryptocurrencies

June 18, 2024Press RoomWeakness / Unauthorized Cryptocurrency Mining

A novel malware scheme has been identified by cybersecurity researchers, targeting publicly visible Docket API points to introduce cryptocurrency miners and other payloads.

New Malware Targets Exposed Docker APIs for Cryptocurrency Mining

June 18, 2024Press RoomWeakness / Unauthorized Cryptocurrency Mining

New Malware Targets Exposed Docker APIs for Cryptocurrency Mining

A novel malware scheme has been identified by cybersecurity researchers, targeting publicly visible Docket API points to introduce cryptocurrency miners and other payloads.

One of the software pieces used in the attack is a remote access program that can download and run more harmful applications. Also included is a tool to spread the malware through SSH, according to a report from cloud analytics platform Datadog published recently.

Upon investigation into this campaign, similarities were found with a prior campaign called Spinning YARN. The previous campaign targeted misconfigured Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services for unauthorized cryptocurrency mining.

Cybersecurity

The assault starts with cybercriminals targeting Docker servers with open ports (specifically port number 2375) to carry out a sequence of actions, beginning with scouting and gaining elevated privileges before advancing to exploitation.

The harmful software is obtained from infrastructure controlled by the attackers by executing a shell script named “vurl.” This includes another script titled “b.sh,” which contains a Base64-encoded binary named “vurl” and manages the retrieval and launch of a third script known as “ar.sh” (“ai.sh”).

“The [‘b.sh’] script decodes and extracts this binary to /usr/bin/vurl, overwriting the current shell script version,” noted security analyst Matt Muir. “This binary differs from the shell script version due to its use of fixed [command-and-control] domains.”

The script “ar.sh” performs multiple actions, like setting up a working environment, setting up tools to scan the web for vulnerable machines, deactivating the firewall, and finally getting the next-stage software, referred to as “chkstart.”

Docker APIs for Cryptocurrency Mining

A Golang binary such as vurl is mainly used to set up the host for remote access and retrieve more tools from a remote server, including “m.tar” and “top,” the latter being an XMRig miner.

“In the initial Spinning YARN campaign, many of chkstart’s features were handled by shell scripts,” Muir elaborated. “Transferring this functionality to Go code could suggest the attacker’s strategy to make the analysis process more complex, as analyzing compiled code is significantly more challenging than shell scripts.”

Cybersecurity

Alongside “chkstart,” two other payloads are downloaded—exeremo, to traverse to more hosts and spread the infection, and fkoths, a Go-based ELF application to eradicate any traces of the malicious activity and resist analysis attempts.

“Exeremo” also deposits a shell script (“s.sh”) that installs several scanning tools like pnscan, masscan, and a custom Docker scanner (“sd/httpd”) to flag vulnerable machines.

“This update to the Spinning YARN campaign indicates a willingness to persist in attacks on wrongly configured Docker hosts for initial access,” highlighted Muir. “The group behind this campaign continues to refine deployed software by transitioning functionality to Go, possibly to hamper analysis efforts or experiment with multi-architecture builds.”

Enjoyed this read? Stay connected on Twitter and LinkedIn for more exclusive updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.