• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
alert: oracleiv ddos botnet targets public docker engine apis to

Alert: OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers

You are here: Home / General Cyber Security News / Alert: OracleIV DDoS Botnet Targets Public Docker Engine APIs to Hijack Containers
November 14, 2023

Publicly-accessible Docker Motor API instances are remaining qualified by menace actors as element of a campaign created to co-choose the devices into a distributed denial-of-services (DDoS) botnet dubbed OracleIV.

“Attackers are exploiting this misconfiguration to supply a malicious Docker container, built from an image named ‘oracleiv_latest’ and that contains Python malware compiled as an ELF executable,” Cado scientists Nate Monthly bill and Matt Muir stated.

The malicious activity starts with attackers using an HTTP Write-up ask for to Docker’s API to retrieve a malicious image from Docker Hub, which, in turn, runs a command to retrieve a shell script (oracle.sh) from a command-and-regulate (C&C) server.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Oracleiv_most recent purports to be a MySQL picture for docker and has been pulled 3,500 instances to day. In a potentially not-so-astonishing twist, the impression also involves supplemental guidance to fetch an XMRig miner and its configuration from the exact same server.

Cybersecurity

That claimed, the cloud security organization explained it did not notice any evidence of cryptocurrency mining executed by the counterfeit container. The shell script, on the other hand, is concise and incorporates features to conduct DDoS attacks these kinds of as slowloris, SYN floods, and UDP floods.

Uncovered Docker cases have come to be a worthwhile attack focus on in modern years, usually employed as conduits for cryptojacking campaigns.

“As soon as a legitimate endpoint is identified, it is really trivial to pull a destructive image and launch a container from it to have out any conceivable objective,” the scientists said. “Hosting the malicious container in Docker Hub, Docker’s container image library, streamlines this procedure even further more.”

It is not just Docker, as vulnerable MySQL servers have emerged as the goal of yet another DDoS botnet malware identified as Ddostf, according to the AhnLab Security Unexpected emergency Reaction Center (ASEC).

“Whilst most of the commands supported by Ddostf are identical to people from normal DDoS bots, a distinct attribute of Ddostf is its skill to link to a recently obtained tackle from the C&C server and execute commands there for a selected time period,” ASEC stated.

MySQL servers

“Only DDoS instructions can be performed on the new C&C server. This implies that the Ddostf risk actor can infect many devices and then provide DDoS attacks as a assistance.”

Compounding matters further more is the emergence of a number of new DDoS botnets, these kinds of as hailBot, kiraiBot, and catDDoS that are based on Mirai, whose supply code leaked in 2016.

Cybersecurity

“These recently developed Trojan horses either introduce new encryption algorithms to hide critical data or superior conceal themselves by modifying the go-reside system and creating extra covert communication procedures,” cybersecurity organization NSFOCUS exposed very last month.

A further DDoS malware that has resurfaced this calendar year is XorDdos, which infects Linux gadgets and “transforms them into zombies” for stick to-on DDoS attacks against targets of interest.

Palo Alto Networks Device 42 claimed the marketing campaign began in late July 2023, in advance of peaking all-around August 12, 2023.

“Right before malware efficiently infiltrated a product, the attackers initiated a scanning system, using HTTP requests to recognize possible vulnerabilities in their targets,” the business pointed out. “To evade detection, the menace turns its process into a track record services that operates independently of the recent person session.”

Discovered this posting intriguing? Follow us on Twitter  and LinkedIn to go through far more distinctive articles we post.


Some components of this short article are sourced from:
thehackernews.com

Previous Post: «ci/cd risks: protecting your software development pipelines CI/CD Risks: Protecting Your Software Development Pipelines
Next Post: The Importance of Continuous Security Monitoring for a Robust Cybersecurity Strategy the importance of continuous security monitoring for a robust cybersecurity»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.