• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
docker malware exploits teneo web3 node to earn crypto via

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

You are here: Home / General Cyber Security News / Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
April 22, 2025

Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency.

The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources.

This involves deploying a malware strain that connects to a nascent Web3 service called Teneo, a decentralized physical infrastructure network (DePIN) that allows users to monetize public social media data by running a Community Node in exchange for rewards called Teneo Points, which can be converted into $TENEO Tokens.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The node essentially functions as a distributed social media scraper to extract posts from Facebook, X, Reddit, and TikTok.

An analysis of artifacts gathered from its honeypots has revealed that the attack starts with a request to launch a container image “kazutod/tene:ten” from the Docker Hub registry. The image was uploaded two months ago and has been downloaded 325 times to date.

The container image is designed to run an embedded Python script that’s heavily obfuscated and requires 63 iterations to unpack the actual code, which sets up a connection to teneo[.]pro.

“The malware script simply connects to the WebSocket and sends keep-alive pings in order to gain more points from Teneo and does not do any actual scraping,” Darktrace said in a report shared with The Hacker News. “Based on the website, most of the rewards are gated behind the number of heartbeats performed, which is likely why this works.”

The campaign is reminiscent of another malicious threat activity cluster that’s known to infect misconfigured Docker instances with the 9Hits Viewer software in order to generate traffic to certain sites in exchange for obtaining credits.

The intrusion set is also similar to other bandwidth-sharing schemes like proxyjacking that involve downloading a specific software to share unused internet resources for some sort of financial incentive.

Cybersecurity

“Typically, traditional cryptojacking attacks rely on using XMRig to directly mine cryptocurrency, however as XMRig is highly detected, attackers are shifting to alternative methods of generating crypto,” Darktrace said. “Whether this is more profitable remains to be seen.”

The disclosure comes as Fortinet FortiGuard Labs revealed a new botnet dubbed RustoBot that’s propagating through security flaws in TOTOLINK (CVE-2022-26210 and CVE-2022-26187) and DrayTek (CVE-2024-12987) devices with an aim to conduct DDoS attacks. The exploitation efforts have been found to primarily target the technology sector in Japan, Taiwan, Vietnam, and Mexico.

“IoT and network devices are often poorly defended endpoints, making them attractive targets for attackers to exploit and deliver malicious programs,” security researcher Vincent Li said. “Strengthening endpoint monitoring and authentication can significantly reduce the risk of exploitation and help mitigate malware campaigns.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «gcp cloud composer bug let attackers elevate access via malicious GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
Next Post: Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito google drops cookie prompt in chrome, adds ip protection to»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.