Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    I switched from Tailscale to this fully self-hosted alternative, and I’m loving it so far

    June 4, 2025

    I Converted My Photos Into Short Videos With AI on Honor’s Latest Phones. It’s Weird

    June 4, 2025

    Don’t let dormant accounts become a doorway for cybercriminals

    June 4, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency
    Cyber Security

    New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

    MichaBy MichaMay 28, 2025No Comments4 Mins Read
    New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency


    Understanding the Latest Cybersecurity Threat: Docker API Malware Campaigns

    Cybersecurity is becoming increasingly complex, especially with the rise of malware targeting Docker APIs for illicit activities. In this article, we delve into a new malware campaign that converts misconfigured Docker API instances into cryptocurrency mining botnets, emphasizing the importance of securing your cloud infrastructure against such threats.

    Rising Threat of Misconfigured Docker APIs

    Recent analyses by cybersecurity experts reveal that inadequately configured Docker API instances are becoming prime targets for threat actors. This specific malware campaign, which focuses on mining Dero currency, has garnered attention due to its self-propagating capabilities. The malware can rapidly infect other vulnerable Docker instances, forming an extensive global network of mining bots.

    The Attack Mechanism

    According to Kaspersky, an unidentified threat actor exploits an insecurely published Docker API to gain initial access to a running containerized infrastructure. From this foothold, they create a network dedicated to cryptojacking. Amged Wageh, a security researcher, notes, “The attack not only compromises the initial victim’s resources but also enables the launch of external attacks targeting additional networks.”

    Components of the Attack Chain

    This sophisticated attack leverages two main components:

    • Propagation Malware “nginx”: This malware scans the internet for exposed Docker APIs, cleverly masquerading as the legitimate nginx web server.
    • Cloud Dero Cryptocurrency Miner: This miner hijacks the compromised resources to mine for Dero currency, further fuelling the botnet.

    Both components are developed using Golang, which explains their high performance and efficiency. The malware creates an infinite loop to generate random IPv4 network subnets, identifying susceptible Docker instances with the default API port (2375) open for exploitation.

    Steps of the Malware Infection Process

    The infection process is precisely orchestrated:

    1. After confirming that a matching IPv4 address has a responsive dockerd daemon, the malware generates a random container name to create a malicious container.
    2. It then updates the packages within this new container using the command docker -H exec apt-get -yq update.
    3. Masscan and docker.io are then installed to facilitate further interactions with the Docker daemon.

    By embedding itself in the /root/.bash_aliases file, the malware ensures it launches automatically upon shell login, increasing its chances of remaining undetected.

    Insights From Recent Cybersecurity Trends

    Interestingly, the recent infection activities tie back to a Dero mining operation first spotted by CrowdStrike in March 2023, which also targeted Kubernetes clusters. Further iterations of this malicious activity were highlighted by Wiz in June 2024. This pattern indicates a growing trend of containerized environments being compromised by both known and new exploitation methods.

    The Broader Implications of Cryptocurrency Mining Botnets

    As cloud infrastructure continues to evolve, it is imperative to understand the potential risks associated with misconfiguration. The malware discussed operates without a traditional command and control (C2) server, making it even more challenging to detect and mitigate. Any network that hosts containerized infrastructure could become a target if the Docker API is publicly available and inadequately secured.

    Emerging Threats: The Monero Miner Campaign

    In another vein, the AhnLab Security Intelligence Center (ASEC) has recently publicized a campaign involving a Monero coin miner alongside an innovative backdoor utilizing the PyBitmessage peer-to-peer communication protocol. This exemplifies the adaptive nature of cyber threats—malware can now utilize sophisticated channels to exchange encrypted packets, making detection considerably harder.

    Best Practices for Securing Docker APIs

    Given the risks associated with exposed Docker APIs, here are some effective cybersecurity practices you can adopt:

    • Implement Strong Access Controls: Ensure that Docker APIs are not publicly accessible, or utilize strong authentication mechanisms.
    • Regularly Audit Configurations: Regularly check your Docker settings to ensure they comply with best practices.
    • Monitor Network Traffic: Use detection systems that can identify unusual activity surrounding your Docker environments.
    • Educate Your Team: Conduct training sessions to inform your team about the threats and vulnerabilities associated with containerized environments.

    Conclusion

    The emergence of malware campaigns targeting misconfigured Docker APIs highlights the ongoing battle in cybersecurity. Staying informed about these threats and implementing robust security measures is essential for protecting your cloud infrastructure from cybercriminals.

    FAQ

    Question 1: What are Docker APIs?

    Docker APIs allow communication and control over Docker, facilitating the management of containerized applications and services.

    Question 2: How can I secure my Docker API?

    To secure your Docker API, restrict its access to trusted networks, implement strong authentication, and regularly audit configurations for vulnerabilities.

    Question 3: What are the potential impacts of a compromise?

    If a Docker API is compromised, threat actors can hijack resources for activities like cryptocurrency mining or launching further attacks on other networks.

    Stay ahead of the curve in cybersecurity by following our updates on Twitter and LinkedIn for more invaluable insights.



    Read the original article

    0 Like this
    Containers cryptocurrency Dero Docker Infects malware SelfSpreading
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleBetter Than Man pages? These Tools Help You Understand Linux Commands
    Next Article Apple is ready to replace Game Center with a more Xbox-like gaming app

    Related Posts

    Cyber Security

    Don’t let dormant accounts become a doorway for cybercriminals

    June 4, 2025
    Cyber Security

    Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack

    June 4, 2025
    Cyber Security

    OpenAI is hopeful GPT-5 will compete a little more

    June 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.