Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Bringing the forestry and timber sector into the 21st century

Microsoft issues patches for SharePoint zero-day and 168 other new vulnerabilities

UKFE launches £1.3bn UK integration strategy, UKAEA publishes national roadmap

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Mining dero cryptocurrency into a new self-complementary malware infected docker container
Identity

Mining dero cryptocurrency into a new self-complementary malware infected docker container

By May 27, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 27, 2025Ravi LakshmananCloud Security/Threat Intelligence

Self-spreading docker malware

Misunderstood Docker API instances have become the target of a new malware campaign that converts them to cryptocurrency mining botnets.

The attack, designed to mine for DERO currency, is notable because worm-like features propagate malware to other exposed Docker instances and rope into a growing horde of mining bots.

Kaspersky said it observed that unidentified threat actors gained initial access to running containerized infrastructure by leveraging the unsettled Docker API to weaponize that access and create illegal cryptojacking networks.

“This compromised the running container and created new containers to not only hijack victim resources for cryptocurrency mining, but also launch external attacks that propagate to other networks.”

The attack chain is realized through two components. Nginx is a propagation malware that scans exposed Docker API and “cloud” Dero Cryptocurrency Miner to the Internet. Both payloads are developed using Golang. The use of “nginx” is a deliberate attempt to fly under the radar under the spoof of a legitimate nginx web server.

Cybersecurity

Propagation malware is designed to record malware execution activity, launch miners, enter into an infinite loop, and generate random IPv4 network subnets to flag more sensitive Docker instances that open the default API port 2375 and compromise.

Next, the remote Dockerd daemon for the host with the matching IPv4 will run and check if it is highly responsive. If the “docker -h ps” command fails, “nginx” simply moves from the list to the next IP address.

“After confirming that the remote Dockerd daemon is running and is highly responsive, Nginx generates a container name with 12 random characters and uses it to create a malicious container for the remote target,” explained Wageh. “Nginx prepares a new container for later installation of dependencies by updating the package via “Docker -H exec -Get -YQ update”. ”

The propagation tool then installs Masscan and docker.io in the container so that the malware can interact with the Docker daemon and perform external scans to infect other networks, further spreading the malware. In the final stage, two payloads “nginx” and “cloud” are transferred to the container using the command “docker -h cp -l/usr/bin/:/usr/bin”.

A way to set up persistence is to ensure that the transferred “nginx” binary is added to the “/root/.bash_aliase” file and automatically launches upon shell login. Another important aspect of malware is that it is designed to infect remote, vulnerable hosts with Ubuntu-based running containers.

The ultimate goal of the campaign is to run a Dero Cryptocurrency Miner based on the open source Derohe Cli Miner available on GitHub.

Kaspersky rated it as a duplicate of the Dero mining campaign previously documented by Cloud Strike in March 2023, and the Dero mining campaign targeting Kubernetes clusters based on the wallet and derod node addresses used. Subsequent iterations of the same campaign were flagged by WIZ in June 2024.

Cybersecurity

“The combination of previously known miners and malicious containers and new samples infected with existing containers has compromised the containerized environment,” Wageh said. “The two malicious implants spread without a C2 server, creating networks with containerized infrastructure and not potentially targeting the Docker API to the Internet.”

The development is that Ahnlab Security Intelligence Center (ASEC) details a campaign that includes the deployment of Monero Coin Miner, along with an unprecedented backdoor using the PybitMessage Peer-to-Peer (P2P) communications protocol, which processes incoming instructions using the Pybitmessage Peer-to-Peer (P2P) communications protocol and runs as a PowerShell script.

The exact distribution method used in the campaign is currently unknown, but it is essential that users avoid downloading files from unknown or unreliable sources and stick to legitimate distribution channels, as they are suspected of being disguised as a cracked version of popular software.

“The Bitmessage protocol is a messaging system designed with anonymity and decentralization in mind, featuring prevention of interception by intermediaries and anonymization of message senders and receivers,” ASEC said.

“Threat Actors utilized the PybitMessage module that implements this protocol in a Python environment, exchanging encrypted packets in a similar format to normal web traffic. In particular, C2 commands and control messages are hidden within messages from real users of the BitMessage network.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSalesforce acquires Informatica for $8 billion
Next Article Report: Tusimple sent sensitive autonomous driving data to China after US national security agreement

Related Posts

Microsoft issues patches for SharePoint zero-day and 168 other new vulnerabilities

April 15, 2026

OpenAI announces GPT-5.4-Cyber ​​with expanded access for security teams

April 15, 2026

New flaw in PHP Composer allows arbitrary command execution – patch released

April 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Bringing the forestry and timber sector into the 21st century

Microsoft issues patches for SharePoint zero-day and 168 other new vulnerabilities

UKFE launches £1.3bn UK integration strategy, UKAEA publishes national roadmap

OpenAI announces GPT-5.4-Cyber ​​with expanded access for security teams

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.