• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new docker malware steals cpu for crypto & drives fake

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

You are here: Home / General Cyber Security News / New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic
January 18, 2024

Susceptible Docker services are staying targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as nicely as the 9Hits Viewer application as element of a multi-pronged monetization approach.

“This is the initially documented case of malware deploying the 9Hits application as a payload,” cloud security organization Cado stated, incorporating the growth is a indication that adversaries are normally on the lookout for diversifying their methods to make dollars off compromised hosts.

9Hits advertises itself as a “special web traffic answer” and an “computerized website traffic exchange” that permits customers of the company to drive targeted visitors to their web pages in trade for getting credits.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

This is accomplished by suggests of a software program known as 9Hits Viewer, which operates a headless Chrome browser occasion to pay a visit to web sites requested by other associates, for which they get paid credits to pay back for generating traffic to their internet sites.

The specific technique applied to spread the malware to vulnerable Docker hosts is now unclear, but it is suspected to entail the use of search engines like Shodan to scan for prospective targets.

The servers are then breached to deploy two destructive containers by using the Docker API and fetch off-the-shelf illustrations or photos from the Docker Hub library for the 9Hits and XMRig software package.

“This is a typical attack vector for strategies focusing on Docker, where in its place of fetching a bespoke image for their uses they pull a generic impression off Dockerhub (which will practically usually be available) and leverage it for their wants,” security researcher Nate Monthly bill claimed.

The 9Hits container is then utilized to execute code to produce credits for the attacker by authenticating with 9Hits working with their session token and extracting the list of sites to stop by.

The risk actors have also configured the scheme to permit checking out adult web pages or web pages that present popups, but reduce it from visiting cryptocurrency-similar web sites.

Cybersecurity

The other container is utilised to operate an XMRig miner that connects to a personal mining pool, building it impossible to ascertain the campaign’s scale and profitability.

“The main influence of this marketing campaign on compromised hosts is source exhaustion, as the XMRig miner will use all offered CPU sources it can when 9hits will use a huge sum of bandwidth, memory, and what small CPU is remaining,” Invoice stated.

“The end result of this is that authentic workloads on infected servers will be unable to complete as anticipated. In addition, the campaign could be up to date to depart a distant shell on the procedure, possibly producing a far more major breach.”

Located this report appealing? Comply with us on Twitter  and LinkedIn to read more distinctive content we publish.


Some elements of this report are sourced from:
thehackernews.com

Previous Post: «russian coldriver hackers expand beyond phishing with custom malware Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
Next Post: U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability u.s. cybersecurity agency warns of actively exploited ivanti epmm vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.