DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

How Containers are Attacked by Cryptominer Malware

DigitalCIO Bureau by DigitalCIO Bureau
April 10, 2020
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Recently, researchers revealed that misconfigured containers are again targeted by Cryptominer malware. Read on to know more about it…

An attack group is searching for insecure containers exposing the Docker API and then installing a program that attempts to mine cryptocurrency. Containers are among the most essential technologies in DevOps known for the speed and efficiency it offers during the development process, while maintaining consistency across the board. However, such agility also exposes organizations to potential risks.

Misconfigured Docker API
A threat actor group was recently found targeting insecure containers, exposed due to misconfigurations in the Docker API. Researchers stumbled upon a cloud-based cryptomining malware called ‘Kinsing’ that targets thousands of Docker systems to run a Bitcoin miner. The research team said that Containers allowing Docker commands to be executed without authentication are at risk.

A quick search using a port-scanning service revealed that around 6,000 IP addresses could be hosting vulnerable installations of Docker. The volume of attacks suggests that it is an aggressive attack campaign since much effort is required into scanning the Internet on a daily basis. Also, in the first week of April 2020, a report revealed that a malicious botnet has been targeting Microsoft SQL database servers for the last two years to mine cryptocurrency. The hackers had managed to infect a significant number of servers, ranging from 2,000 to 3,000, on a daily basis.

Other Cryptojacking Attacks
Over the years, we have seen cryptojacking attacks affecting various kinds of devices but recently, hackers have resorted to Containers to channelize their attacks and quickly infect additional systems. Security teams can learn about their attack tactics from previous attack campaigns such as the following instances

• Researchers found a new cryptojacking worm, dubbed “Graboid,” that spreads using Containers in the Docker Engine and was deployed to mine Monero coins.
• An API misconfiguration in Docker Engine-Community allowed attackers to infiltrate Containers and run a variant of the Linux botnet malware AESDDoS.
• Last year, a group of researchers revealed Containers caught in malicious trap coming from a publicly accessible Docker Hub repository named “zoolu2” that contained the binary of a Monero (XMR) cryptocurrency miner.
• Researchers detected “Xulu”, a mining botnet, that deployed malicious Docker Containers on victim hosts by exploiting Docker’s remote API.

In 2018, it was reported that seventeen malicious Docker Containers earned cryptomining criminals $90,000 in a span of just 30 days.

Compromising Containers
Various threats attackers exploit to compromise Containers are through

• Default configuration during image creation: It is one of the most common mistakes. During image creation, users often install an application with its default configuration, ignoring the security aspects.
• Exposed data in docker files: Attackers are always looking for data such as passwords and the private portions of SSH encryption keys in Dockers. Even default passwords for an account is a big risk.
• Unreliable third-party sources: Hackers have been dropping malicious codes on public platforms such as a GitHub repository to target unsuspecting users. This opens up the container to potential attacks.
• Exposed applications and ports: Deployed applications can be exploited through SQL injection, cross-site scripting, brute-force attacks, and remote file inclusion. Exposed ports in applications can also lead to API abuse.
• Non-update vulnerable images: Container images need to be regularly updated. Older infected images (with vulnerabilities or bugs) could be exploited by hackers for malicious attacks.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Vats Srivatsan named Interim CEO of WatchGuard Technologies

by DigitalCIO Bureau
May 8, 2025
0
Vats Srivatsan named Interim CEO of WatchGuard Technologies

WatchGuard Technologies Chief Executive Officer (CEO) Prakash Panjwani will transition out of his operational role, continuing to serve on the Board of Directors and as a strategic advisor...

Read moreDetails

Google 2024 Ads Safety Report: AI plays key role in safer advertising ecosystem

by DigitalCIO Bureau
April 19, 2025
0
Google 2024 Ads Safety Report: AI plays key role in safer advertising ecosystem

Google has released its 2024 Ads Safety Report, demonstrating how it is using advanced AI technology to create a safe and responsible advertising ecosystem. A notable finding from...

Read moreDetails

Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

by DigitalCIO Bureau
December 26, 2024
0
Proofpoint Named a Leader in 2024 Gartner Magic Quadrant

Proofpoint announced it has been named a Leader in the 2024 Gartner Magic Quadrant for Email Security Platforms. The Gartner Magic Quadrant for Secure Email Gateways was last published in...

Read moreDetails

Tenable Adds New Features To Security Center

by DigitalCIO Bureau
December 20, 2024
0
Tenable Appoints Shai Morag As Chief Product Officer

Tenable has announced new vulnerability intelligence, risk prioritization and web application scanning features for Tenable Security Center, the world’s #1 vulnerability management solution managed on-premises. Tenable Security Center identifies, investigates...

Read moreDetails

Commvault Unveils innovation facility in Coimbatore

by DigitalCIO Bureau
November 12, 2024
0
Commvault Unveils innovation facility in Coimbatore

Commvault announced the launch of an advanced, facility in Coimbatore, Tamil Nadu. This facility, which complements Commvault’s existing operations in Bangalore and strengthens the company’s presence in India,...

Read moreDetails
Next Post

72% Indian firms see Covid-19 impact going beyond 6 months

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

CEOs Lack Confidence in Their Organisations’ Ability to Protect Against Cyberattacks: Accenture

Gartner Identifies Top Cybersecurity Trends for 2025

March 4, 2025
HCLTech infuses GenAI into MRO solution

HCLTech infuses GenAI into MRO solution

May 30, 2024
The Evolving Role of AI in Data Protection

The Evolving Role of AI in Data Protection

January 31, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Nutanix Palo Alto Networks Panel Discussion Qlik Salesforce Schneider Electric ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?