Today > | 1 Medium vulnerabilities   -   You can now download lists of IOCs here!

Threat Actors leverage Docker Swarm and Kubernetes to mine cryptocurrency at scale

Sept. 25, 2024, 1:10 p.m.

Description

A new cryptojacking campaign targeting Docker Engine API has been discovered, with the ability to move laterally to Docker Swarm, Kubernetes, and SSH servers. The attackers exploit exposed Docker API endpoints to deploy cryptocurrency miners and additional malicious payloads. They utilize Docker Hub to host malicious images and leverage Docker Swarm's orchestration features for command and control purposes. The campaign employs various techniques for lateral movement, persistence, and evasion, including manipulating Docker Swarm, exploiting Kubernetes' kubelet API, and installing backdoors. While some indicators suggest a possible link to TeamTNT, there is insufficient evidence for definitive attribution.

Date

Published: Sept. 25, 2024, 12:43 p.m.

Created: Sept. 25, 2024, 12:43 p.m.

Modified: Sept. 25, 2024, 1:10 p.m.

Indicators

e6985878b938bd1fba3e9ddf097ba1419ff6d77c3026abdd621504f5c4186441

e4c4400a4317a193f49c0c53888ec2f27e20b276c2e6ee1a5fd6eacf3f2a0214

d99bd3a62188213894684d8f9b4f39dbf1453cc7707bac7f7b8f484d113534b0

9d02707b895728b4229abd863aa6967d67cd8ce302b30dbcd946959e719842ad

78ebc26741fc6bba0781c6743c0a3d3d296613cc8a2bce56ef46d9bf603c7264

700635abe402248ccf3ca339195b53701d989adb6e34c014b92909a2a1d5a0ff

6f426065e502e40da89bbc8295e9ca039f28b50e531b33293cee1928fd971936

6157a74926cfd66b959d036b1725a63c704b76af33f59591c15fbf85917f76fa

505237e566b9e8f4a83edbe45986bbe0e893c1ca4c5837c97c6c4700cfa0930a

2514e5233c512803eff99d4e16821ecc3b80cd5983e743fb25aa1bcc17c77c79

0af1b8cd042b6e2972c8ef43d98c0a0642047ec89493d315909629bcf185dffd

c5391314ce789ff28195858a126c8a10a4f9216e8bd1a8ef71d11c85c4f5175c

45.9.148.35

192.155.94.199

164.68.106.96

https://solscan.live/up/kube_in.php

https://solscan.live/upload.php

https://solscan.live/so/xmrig.so

https://solscan.live/sh/xmr.sh.sh

https://solscan.live/sh/spread_ssh.sh

https://solscan.live/sh/spread_kube_loop.sh

https://solscan.live/sh/spread_docker_local.sh

https://solscan.live/sh/setup_xmr.sh

https://solscan.live/sh/search.sh

https://solscan.live/sh/kube.lateral.sh

https://solscan.live/sh/init.sh

https://solscan.live/scan_threads.dat

https://solscan.live/data/docker.container.local.spread.txt

https://solscan.live/bin/xmrig

https://solscan.live/bin/xmr/x86_64

https://solscan.live/bin/pnscan_1.12+git20180612.orig.tar.gz

https://solscan.live/bin/64bit/xmrig

https://solscan.live/aws.sh

http://solscan.live/sh/init.sh

http://solscan.live/chimaera/sh/init.sh

http://solscan.live/bin/zgrab

http://192.155.94.199/sh/xmr.sh.sh

http://45.9.148.35/aws

x.solscan.live

solscan.live

borg.wtf

Attack Patterns

XMRig

T1574.006

T1027.004

T1053.003

T1078.001

T1543.002

T1562.004

T1552.002

T1021.004

T1021.001

T1552.001

T1070.004

T1222.002

T1016

T1518

T1082

T1105

T1496

T1046