home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1427 
 Mike Powell to All 
 Misconfigured Docker inst 
 29 May 25 07:57:00 
 
TZUTC: -0500
MSGID: 1160.consprcy@1:2320/105 2c9d9863
PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0
TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
Misconfigured Docker instances are being hacked to mine cryptocurrency

Date:
Wed, 28 May 2025 14:25:00 +0000

Description:
A worm is spreading the miner autonomously, earning attackers plenty of Dero.

FULL STORY

Hackers are building a botnet out of misconfigured Docker API instances and
using it to mine the Dero cryptocurrency, experts have warned. 

Security researchers from Kaspersky reported finding a container zombie
outbreak that started with an exposed Docker API. 

This led to the running containers being compromised and new ones being
created not only to hijack the victims resources for cryptocurrency mining 
but also to launch external attacks to propagate to other networks, they
explained.

In this zombie outbreak, the patient zero is a misconfigured API thats left
open to the internet. There, the attackers deploy a piece of malware 
disguised as nginx, a high-performance, open-source web server and reverse
proxy server. 

The malware scans for vulnerable instances and infects them, and then creates
new malicious containers and forces existing ones to mine Dero. At the same
time, it continues to spread to other systems. 

This is a two-step process, Kaspersky explains. Nginx is the propagation tool
that scans for new victims, with the miner being a cloud-based solution. Both
components are written in Golang, which makes them rather difficult to 
detect. 

Kaspersky also says that unlike traditional cryptojacking campaigns, this one
doesnt rely on a command & control (C2) server, but instead spreads
autonomously, like a worm. 

Users running Docker should check their API settings, and make sure its not
exposed to the internet. Furthermore, they should fortify their login
credentials, and perform regular security audits and monitoring. 

While cybercriminals usually hijack servers to mine Monero with the XMRig,
this is not the first time researchers spotted Dero. According to The Hacker
News , CrowdStrike saw Kubernetes clusters being targeted back in March 2023,
and a subsequent iteration of the same campaign was spotted by Wiz in June
2024. 

Similar to Monero, Dero is also a privacy-focused Layer 1 blockchain, built 
to support decentralized applications (dApps) and smart contracts. 

 Via The Hacker News

======================================================================
Link to news story:
https://www.techradar.com/pro/security/misconfigured-docker-instances-are-bein
g-hacked-to-mine-cryptocurrency

$$
--- SBBSecho 3.20-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 111 114 206 300 307 317 400 426 428
SEEN-BY: 229/470 664 700 705 266/512 291/111 320/219 322/757 342/200
SEEN-BY: 396/45 460/58 712/848 902/26 2320/0 105 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca