{"id":21981,"date":"2022-04-22T10:53:26","date_gmt":"2022-04-22T14:53:26","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=21981"},"modified":"2022-04-28T14:21:32","modified_gmt":"2022-04-28T18:21:32","slug":"cryptomining-malware-campaign-target-docker-severs","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/cryptomining-malware-campaign-target-docker-severs\/","title":{"rendered":"Cryptomining Malware Campaign Target Docker Severs"},"content":{"rendered":"<p data-ar-index=\"0\">Operators of the Lemon_Duck botnet are targeting Docker APIs on Linux servers using a large-scale Monero crypto-mining campaign.<\/p>\n<p data-ar-index=\"1\">According to a Crowdstrike report, Lemon_Duck operators hide their wallets behind proxy pools. The hackers gain access to exposed Docker APIs and run a malicious container to fetch a Bash script disguised as a PNG image.<\/p>\n<p data-ar-index=\"2\">The Bash file created by the payload performs several functions including killing processes based on names of known mining pools; killing daemons like crond, sshd, and syslog; and deleting known indicators of compromise (IOC) file paths.<\/p>\n<p data-ar-index=\"3\">Others include killing network connections to C2s known to belong to competing cryptomining groups and disabling Alibaba Cloud&#8217;s monitoring service that protects instances from risky activities.<\/p>\n<p data-ar-index=\"4\">The Bash script after running the actions above download and run the cryptomining utility XMRig together with a configuration file that hides the actor&#8217;s wallets behind the proxy pools.<\/p>\n<p data-ar-index=\"5\">To keep the Docker threat in check, it is important to configure Docker API deployments security. organizations can do this by checking the platform&#8217;s best practices and security recommendations.<\/p>\n<p data-ar-index=\"6\">Also, organizations are advised to set resource consumption limitations on all containers, impose strict image authentication policies and enforce the principles of least privilege.<\/p>\n<p data-ar-index=\"7\">The Sources for this piece include an article in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/docker-servers-hacked-in-ongoing-cryptomining-malware-campaign\/\" target=\"_blank\" rel=\"noopener\">BleepingComputer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Operators of the Lemon_Duck botnet are targeting Docker APIs on Linux servers using a large-scale Monero crypto-mining campaign. According to a Crowdstrike report, Lemon_Duck operators hide their wallets behind proxy pools. The hackers gain access to exposed Docker APIs and run a malicious container to fetch a Bash script disguised as a PNG image. The [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19,16],"tags":[388,393],"class_list":["post-21981","post","type-post","status-publish","format-standard","hentry","category-cloud","category-security","tag-privacy-security","tag-security-strategies"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/21981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=21981"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/21981\/revisions"}],"predecessor-version":[{"id":21983,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/21981\/revisions\/21983"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=21981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=21981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=21981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}