Exposed Docker APIs Likely Exploited to Build Botnet
securityweek
Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet, Akamai’s security researchers warn.
Initially detailed by Trend Micro in June, the attacks start with a request to the exposed API to retrieve a list of containers, followed by the creation of a new container based on the Alpine Docker image.
Next, the attackers mount the host root to the fresh container, a technique that allows them to manipulate the host system and escape the container.
Hidden in the initial command is an encoded payload that leads to the execution of a shell script that sets up the Tor browser in the container and fetches a payload over the Tor network. They also set up a socks5h proxy configuration to route all traffic and DNS resolution through the anonymity network.
Once the container is started, the attackers deploy a malicious ...
Copyright of this story solely belongs to securityweek . To see the full text click HERE