Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » New Docker malware steals CPU for cryptocurrency and drives fake website traffic
    Cyber Security

    New Docker malware steals CPU for cryptocurrency and drives fake website traffic

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 18, 2024Editorial DepartmentServer Security/Encryption

    Docker malware

    Vulnerable Docker services are being targeted in a novel campaign in which threat actors are deploying the XMRig cryptocurrency miner and 9Hits Viewer software as part of a multi-pronged monetization strategy.

    “This is the first documented case of malware deploying the 9Hits application as a payload,” said cloud security firm Cado, adding that the development shows that adversaries are always looking for diverse strategies to exploit victims. Make money on infected hosts.

    9Hits promotes itself as a “unique web traffic solution” and “automated traffic exchange” that allows service members to drive traffic to its website in exchange for purchasing credits.

    Internet security

    This is accomplished through software called 9Hits Viewer, which runs a headless Chrome browser instance to visit websites requested by other members, who can earn points to pay for generating traffic to their websites.

    The exact method used to spread the malware to vulnerable Docker hosts is unclear, but it is suspected to involve using search engines such as Shodan to scan for potential targets.

    The server was then compromised, two malicious containers were deployed via the Docker API, and ready-made images of the 9Hits and XMRig software were obtained from the Docker Hub repository.

    Security researcher Nate Bill said: “This is a common attack vector for attacks against Docker. Instead of obtaining a custom image for their own purposes, they pull a generic image from Dockerhub (which is almost always accessible) and use it to suit their own needs. needs.”

    The 9Hits container is then used to execute code that generates points for the attacker by using the session token to authenticate to 9Hits and extract a list of sites to access.

    Threat actors have also configured the scheme to allow access to adult websites or websites that display pop-ups, but block access to cryptocurrency-related websites.

    Internet security

    Another container is used to run an XMRig miner connected to a private mining pool, so the scale and profitability of this activity cannot be determined.

    “The main impact of this campaign on infected hosts is resource exhaustion, as the XMRig miner will use all available CPU resources, while 9hits will use a lot of bandwidth, memory, and whatever CPU resources are left,” Bill said.

    “The result of this is that legitimate workloads on compromised servers will not execute as expected. Additionally, the campaign may be updated to leave a remote shell on the system, which may lead to more severe vulnerabilities.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.