Researchers discovered a new cryptojacking worm called “Graboid” that has spread to more than 2,000 unsecured Docker hosts.
In its research, Palo Alto Networks’ Unit 42 team noted that it’s the first time it’s discovered a cryptojacking worm specifically using containers in the Docker Engine for distribution. (It’s not the first time that cryptojacking malware have taken on the form of a worm, however.)
Unit 42 researchers found that an infection begins when malicious actors establish an initial foothold through unsecured Docker daemons. A quick search on Shodan uncovered over unsecured 2,000 Docker engines lacking any authentication or authorization measures. These weaknesses enabled the threat actors to compromise the daemon, run the malicious Docker container pulled from Docker Hub, download several scrips from its command-and-control (C&C) server and pick its next target. To do so, Graboid selected three targets at a time. It then installed the worm on the first target, stopped its Monero miner on the second target and started the miner on the third target.
The exact motivation for creating this design remained unclear at the time of discovery.
To better understand this behavior, Unit 42 created its own Python-based simulation involving 2,000 hosts in an IP file. The team found that Graboid reached all 1,400 vulnerable hosts that didn’t fail (70 percent of the total) in approximately 60 seconds and ran the mining process on 900 hosts at any given time. Overall, each miner was active for only about 65 percent of the time, with each mining session lasting only about 250 seconds.
While this cryptojacking worm doesn’t (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/graboid-cryptojacking-worm-has-struck-over-2k-unsecured-docker-hosts/