Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

[contact-form-7 id="dd1f6aa" title="Newsletter"]
What's Hot

Using MITRE D3FEND to strengthen you home network

September 8, 2025

Speed Isn’t Everything When Buying SSDs

September 8, 2025

Debian 13.1 Released With An Initial Batch Of Fixes

September 8, 2025
Facebook X (Twitter) Instagram
Facebook Mastodon Bluesky Reddit
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
Home»Cyber Security»New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
Cyber Security

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

MichaBy MichaMay 28, 2025No Comments4 Mins Read
New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency


Understanding the Latest Cybersecurity Threat: Docker API Malware Campaigns

Cybersecurity is becoming increasingly complex, especially with the rise of malware targeting Docker APIs for illicit activities. In this article, we delve into a new malware campaign that converts misconfigured Docker API instances into cryptocurrency mining botnets, emphasizing the importance of securing your cloud infrastructure against such threats.

Rising Threat of Misconfigured Docker APIs

Recent analyses by cybersecurity experts reveal that inadequately configured Docker API instances are becoming prime targets for threat actors. This specific malware campaign, which focuses on mining Dero currency, has garnered attention due to its self-propagating capabilities. The malware can rapidly infect other vulnerable Docker instances, forming an extensive global network of mining bots.

The Attack Mechanism

According to Kaspersky, an unidentified threat actor exploits an insecurely published Docker API to gain initial access to a running containerized infrastructure. From this foothold, they create a network dedicated to cryptojacking. Amged Wageh, a security researcher, notes, “The attack not only compromises the initial victim’s resources but also enables the launch of external attacks targeting additional networks.”

Components of the Attack Chain

This sophisticated attack leverages two main components:

  • Propagation Malware “nginx”: This malware scans the internet for exposed Docker APIs, cleverly masquerading as the legitimate nginx web server.
  • Cloud Dero Cryptocurrency Miner: This miner hijacks the compromised resources to mine for Dero currency, further fuelling the botnet.

Both components are developed using Golang, which explains their high performance and efficiency. The malware creates an infinite loop to generate random IPv4 network subnets, identifying susceptible Docker instances with the default API port (2375) open for exploitation.

Steps of the Malware Infection Process

The infection process is precisely orchestrated:

  1. After confirming that a matching IPv4 address has a responsive dockerd daemon, the malware generates a random container name to create a malicious container.
  2. It then updates the packages within this new container using the command docker -H exec apt-get -yq update.
  3. Masscan and docker.io are then installed to facilitate further interactions with the Docker daemon.

By embedding itself in the /root/.bash_aliases file, the malware ensures it launches automatically upon shell login, increasing its chances of remaining undetected.

Insights From Recent Cybersecurity Trends

Interestingly, the recent infection activities tie back to a Dero mining operation first spotted by CrowdStrike in March 2023, which also targeted Kubernetes clusters. Further iterations of this malicious activity were highlighted by Wiz in June 2024. This pattern indicates a growing trend of containerized environments being compromised by both known and new exploitation methods.

The Broader Implications of Cryptocurrency Mining Botnets

As cloud infrastructure continues to evolve, it is imperative to understand the potential risks associated with misconfiguration. The malware discussed operates without a traditional command and control (C2) server, making it even more challenging to detect and mitigate. Any network that hosts containerized infrastructure could become a target if the Docker API is publicly available and inadequately secured.

Emerging Threats: The Monero Miner Campaign

In another vein, the AhnLab Security Intelligence Center (ASEC) has recently publicized a campaign involving a Monero coin miner alongside an innovative backdoor utilizing the PyBitmessage peer-to-peer communication protocol. This exemplifies the adaptive nature of cyber threats—malware can now utilize sophisticated channels to exchange encrypted packets, making detection considerably harder.

Best Practices for Securing Docker APIs

Given the risks associated with exposed Docker APIs, here are some effective cybersecurity practices you can adopt:

  • Implement Strong Access Controls: Ensure that Docker APIs are not publicly accessible, or utilize strong authentication mechanisms.
  • Regularly Audit Configurations: Regularly check your Docker settings to ensure they comply with best practices.
  • Monitor Network Traffic: Use detection systems that can identify unusual activity surrounding your Docker environments.
  • Educate Your Team: Conduct training sessions to inform your team about the threats and vulnerabilities associated with containerized environments.

Conclusion

The emergence of malware campaigns targeting misconfigured Docker APIs highlights the ongoing battle in cybersecurity. Staying informed about these threats and implementing robust security measures is essential for protecting your cloud infrastructure from cybercriminals.

FAQ

Question 1: What are Docker APIs?

Docker APIs allow communication and control over Docker, facilitating the management of containerized applications and services.

Question 2: How can I secure my Docker API?

To secure your Docker API, restrict its access to trusted networks, implement strong authentication, and regularly audit configurations for vulnerabilities.

Question 3: What are the potential impacts of a compromise?

If a Docker API is compromised, threat actors can hijack resources for activities like cryptocurrency mining or launching further attacks on other networks.

Stay ahead of the curve in cybersecurity by following our updates on Twitter and LinkedIn for more invaluable insights.



Read the original article

0 Like this
Containers cryptocurrency Dero Docker Infects malware SelfSpreading
Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
Previous ArticleBetter Than Man pages? These Tools Help You Understand Linux Commands
Next Article Apple is ready to replace Game Center with a more Xbox-like gaming app

Related Posts

Cyber Security

Murky Panda hackers exploit cloud trust to hack downstream customers

August 24, 2025
Cyber Security

AI-powered financial scams swamp social media

August 22, 2025
Cyber Security

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

August 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Andy’s Tech

April 19, 20259 Views
Stay In Touch
  • Facebook
  • Mastodon
  • Bluesky
  • Reddit

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

About Us

Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

Most Popular

AI Developers Look Beyond Chain-of-Thought Prompting

May 9, 202515 Views

6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

April 21, 202512 Views

Subscribe to Updates

Facebook Mastodon Bluesky Reddit
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2025 ioupdate. All Right Reserved.

Type above and press Enter to search. Press Esc to cancel.