Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

iPhone 17, iPhone Air, AirPods Pro 3, and everything else announced at Apple hardware events

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TOR-based crypto jacking attacks escalate through misconfigured Docker APIs
Identity

TOR-based crypto jacking attacks escalate through misconfigured Docker APIs

userBy userSeptember 9, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs.

Akamai, who discovered the latest activity last month, said it was designed to block other actors from accessing the Docker API from the Internet.

The findings were built on a previous report from Trend Micro in late June 2025, and discovered a malicious campaign that targeted exposed Docker instances to secretly drop Xmrig Cryptocurrency Miner using the TOR domain for anonymity.

“This new strain appears to use similar tools to the original, but may have different end goals, including the possibility of setting the foundations for complex botnets,” said security researcher Yonatan Gilvarg.

Attack chains essentially involve intruding into misunderstood Docker APIs to run a new container based on the Alpine Docker image and mount the host file system on it. This is followed by a threat actor running a base64-encoded payload downloading the shell script downloader from the A.Onion domain.

Audit and subsequent

In addition to changing the SSH configuration to set up persistence, the script also installs other tools such as Masscan, Libpcap, Libpcap-Dev, ZSTD, Torsock and performs reconnaissance, contacts the Command and Control (C2) server, and the second. Download the compressed binary from the inion domain.

“The files that were originally downloaded will not communicate to the Internet as they are GO-written droppers that contain the content they want to drop,” explained Gilvarg. “We parse the UTMP file to find out who is currently logged in to the machine, except that we drop another binary file.”

Interestingly, the source code for the binary file contains emojis that depict users signed in to the system. This indicates that the artifacts may have been created using a large language model (LLM).

Dropper also launches Masscan to transmit infections to those machines by repeating the same process as scanning the Internet for Open Docker API services on port 2375 and creating containers with Base64 commands.

Additionally, the binary includes two more port checks: 23 (Telnet) and 9222 (remote debug port for chrome browser). The capabilities that spread through these ports are not yet fully embodied.

Telnet attack methods involve using a set of known default router and device credentials for brute force logins to ensure successful attempts to sign in to the webhook.[.]A site endpoint with details about the destination IP address and victim authentication credentials.

On port 9222, the malware interacts with the web browser using a GO library named ChromedP. Previously, North Korean threat actors have communicated with C2 servers, communicated with Stealer Malware, bypassed Chrome’s app-binding encryption, and remotely connected to Chromium Sessions, Siphon cookies and other private data.

It then connects to an existing session using an open remote port, and eventually sends the post to the same .Onion domain that is used to retrieve the shell script downloader, using information about the source IP address where the malware is located and the destination that can access port 9222.

Details are sent to an endpoint named “httpbot/add” where devices with exposed remote debug ports can register devices with remote debug ports for chrome/chrome with botnets to provide additional payloads that can steal data, or to perform distributed negation deny (DDOS) attacks.

“The malware scans only port 2375, so the logic to handle ports 23 and 9222 is currently unreachable and cannot be executed,” Gilvalg said. “However, implementations may exist and indicate future capabilities.”

“Attackers have great control over systems affected by abused APIs. Segmenting networks, limiting service exposure to the Internet, and ensuring default credentials cannot be overstated. By adopting these measures, organizations can significantly reduce vulnerability to such threats.”

Wiz Flags AWS SES Abuse Campaign

This disclosure was made by cloud security company Wiz in detail in May 2025, using its Amazon Simple Email Service (SES) campaign, using its Amazon Web Services (AWS) access keys as launchpads for mass phishing attacks.

CIS Build Kit

Currently, I don’t know how the key was obtained. However, there are various ways that attackers can achieve this. An accidental public exposure of a code repository, or theft through an incorrect asset or from a developer workstation using Stealer Malware.

“Attackers use the compromised key to access the victim’s AWS environment, bypass the built-in restrictions of SES, verify the identity of the new “sender” and prepare and carry out phishing operations in an orderly manner,” said Wiz researchers Itay Harel and Hila Ramati.

Wiz, who worked with Proofpoint to further explore the phishing campaign, said the email was targeted at several organizations across multiple regions and sectors, and adopted tax-themed lures to redirect recipients to the eligibility harvest page.

“If SES is configured with an account, an attacker can send emails from a verified domain,” Wiz warned. “Beyond brand damage, this allows for phishing that appears to come from you, and can be used to spear, fraud, theft of data or decoration in business processes.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCan antibacterial coatings redefine hygiene?
Next Article Rethinking methane emissions in the global food system
user
  • Website

Related Posts

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

September 9, 2025

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

September 9, 2025

Raton Android Malware Detected with NFC Relay and ATS Banking Fraud Features

September 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

iPhone 17, iPhone Air, AirPods Pro 3, and everything else announced at Apple hardware events

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Tesla revamps its megapack in an attempt to turn its declining storage business around

New emojis include Bigfoot, Orca whales, Treasure Chests and more

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.