• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud

You are here: Home / General Cyber Security News / Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud
April 22, 2022

Cryptocurrency Miners

LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux units as component of an active malware campaign.

“It operates an anonymous mining operation by the use of proxy pools, which disguise the wallet addresses,” CrowdStrike said in a new report. “It evades detection by concentrating on Alibaba Cloud’s checking support and disabling it.”

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Known to strike the two Windows and Linux environments, LemonDuck is primarily engineered for abusing the procedure assets to mine Monero. But it truly is also capable of credential theft, lateral movement, and facilitating the deployment of added payloads for follow-on things to do.

“It utilizes a broad assortment of spreading mechanisms — phishing e-mail, exploits, USB units, brute power, amongst many others — and it has shown that it can swiftly just take edge of news, situations, or the launch of new exploits to operate successful strategies,” Microsoft in-depth in a complex create-up of the malware very last July.

CyberSecurity

In early 2021, attack chains involving LemonDuck leveraged the then freshly patched Trade Server vulnerabilities to acquire access to out-of-date Windows devices, in advance of downloading backdoors and data stealers, including Ramnit.

The most current campaign noticed by CrowdStrike can take gain of uncovered Docker APIs as an original access vector, working with it to run a rogue container to retrieve a Bash shell script file which is disguised as a harmless PNG image file from a distant server.

An investigation of historical facts shows that comparable picture file droppers hosted on LemonDuck-linked domains have been place to use by the risk actor considering the fact that at least January 2021, the cybersecurity business pointed out.

cryptocurrency mining botnet

The dropper documents are essential to launching the attack, with the shell script downloading the genuine payload that then kills competing procedures, disables Alibaba Cloud’s checking providers, and finally downloads and operates the XMRig coin miner.

With compromised cloud instances getting to be a hotbed for illicit cryptocurrency mining things to do, the findings underscore the want to secure containers from potential challenges during the software package offer chain.

TeamTNT targets AWS, Alibaba Cloud

The disclosure comes as Cisco Talos uncovered the toolset of a cybercrime team named TeamTNT, which has a heritage of targeting cloud infrastructure for cryptojacking and putting backdoors.

cryptocurrency mining botnet

The malware payloads, which are reported to have been modified in response to past general public disclosures, are largely created to focus on Amazon Web Solutions (AWS) whilst at the same time targeted on cryptocurrency mining, persistence, lateral motion, and disabling cloud security alternatives.

CyberSecurity

“Cybercriminals who are outed by security scientists have to update their applications in purchase to continue to run efficiently,” Talos researcher Darin Smith reported.

“The resources employed by TeamTNT reveal that cybercriminals are increasingly relaxed attacking modern environments such as Docker, Kubernetes, and general public cloud suppliers, which have customarily been prevented by other cybercriminals who have as a substitute focused on on-premise or cellular environments.”

Spring4Shell exploited for cryptocurrency mining

That’s not all. In however another instance of how threat actors quickly co-choose freshly disclosed flaws into their attacks, the critical remote code execution bug in Spring Framework (CVE-2022-22965) has been weaponized to deploy cryptocurrency miners.

The exploitation tries make use of a tailor made web shell to deploy the cryptocurrency miners, but not ahead of turning off the firewall and terminating other virtual currency miner procedures.

“These cryptocurrency miners have the prospective to have an effect on a large variety of users, especially considering that Spring is the most widely used framework for creating company-stage purposes in Java,” Development Micro researchers Nitesh Surana and Ashish Verma mentioned.

Observed this post exciting? Comply with THN on Fb, Twitter  and LinkedIn to read more exclusive written content we article.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «Cyber Security News Crypto-Mining Botnet Goes After Misconfigured Docker APIs
Next Post: State Actors Drive Record Number of Zero-Day Exploits in 2021 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • State Actors Drive Record Number of Zero-Day Exploits in 2021
  • Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud
  • Crypto-Mining Botnet Goes After Misconfigured Docker APIs
  • QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities
  • Cisco Releases Security Patches for TelePresence, RoomOS and Umbrella VA
  • Bob’s Red Mill Reports Data Breach
  • FBI Seeks Info on BlackCat
  • North Korea Funding Nuclear Program with Cyber Activity
  • Hackers Sneak ‘More_Eggs’ Malware Into Resumes Sent to Corporate Hiring Managers
  • Hackers Sneak ‘More_Eggs’ Malware Into Resumes Sent to Corporate Hiring Managers

Copyright © TheCyberSecurity.News, All Rights Reserved.