• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

New Malware Targets Exposed Docker APIs for Cryptocurrency Mining

You are here: Home / Cyber Security News / New Malware Targets Exposed Docker APIs for Cryptocurrency Mining

Cybersecurity researchers have uncovered a new malware marketing campaign that targets publicly exposed Docket API endpoints with the purpose of offering cryptocurrency miners and other payloads.

Provided between the tools deployed is a remote accessibility tool which is able of downloading and executing additional malicious plans as perfectly as a utility to propagate the malware by means of SSH, cloud analytics platform Datadog stated in a report printed very last week.

Assessment of the campaign has uncovered tactical overlaps with a former activity dubbed Spinning YARN, which was observed focusing on misconfigured Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis solutions for cryptojacking reasons.

The attack commences with the danger actors zeroing in on Docker servers with exposed ports (port range 2375) to initiate a series of measures, beginning with reconnaissance and privilege escalation before continuing to the exploitation period.

Payloads are retrieved from adversary-managed infrastructure by executing a shell script named “vurl.” This consists of one more shell script identified as “b.sh” that, in change, packs a Foundation64-encoded binary named “vurl” and is also liable for fetching and launching a 3rd shell script recognized as “ar.sh” (or “ai.sh”).

“The [‘b.sh’] script decodes and extracts this binary to /usr/bin/vurl, overwriting the current shell script edition,” security researcher Matt Muir mentioned. “This binary differs from the shell script model in its use of hard-coded [command-and-control] domains.”

The shell script, “ar.sh,” performs a amount of steps, including location up a functioning directory, installing applications to scan the internet for susceptible hosts, disabling firewall, and in the long run fetching the subsequent-stage payload, referred to as “chkstart.”

A Golang binary like vurl, its key goal is to configure the host for distant accessibility and fetch more equipment, together with “m.tar” and “top rated,” from a distant server, the latter of which is an XMRig miner.

“In the original Spinning YARN campaign, significantly of chkstart’s performance was dealt with by shell scripts,” Muir defined. “Porting this operation about to Go code could recommend the attacker is making an attempt to complicate the evaluation method, considering the fact that static assessment of compiled code is appreciably more hard than shell scripts.”

Downloading alongside “chkstart” are two other payloads identified as exeremo, which is used to laterally move to much more hosts and spread the an infection, and fkoths, a Go-centered ELF binary to erase traces of the malicious action and resist examination attempts.

“Exeremo” is also developed to fall a shell script (“s.sh”) that will take care of setting up a variety of scanning applications like pnscan and masscan to flag susceptible systems.

“This update to the Spinning YARN marketing campaign displays a willingness to go on attacking misconfigured Docker hosts for original accessibility,” Muir reported. “The menace actor driving this campaign continues to iterate on deployed payloads by porting performance to Go, which could reveal an endeavor to hinder the examination course of action, or point to experimentation with multi-architecture builds.”

Identified this write-up intriguing? Adhere to us on Twitter  and LinkedIn to examine more exceptional content we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
Next Post: The Annual SaaS Security Report: 2025 CISO Plans and Priorities »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
  • Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
  • Securing CI/CD workflows with Wazuh
  • How to Detect Phishing Attacks Faster: Tycoon2FA Example
  • Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps

Copyright © 2025 · AllTech.News, All Rights Reserved.