A new cryptojacking campaign is targeting Docker environments using a novel mining technique. Researchers from Darktrace and Cado Security Labs have identified the attack, which shifts from traditional cryptojacking methods. Instead of using XMRig, the attacker uses a legitimate Web3 service, teneo.pro, to collect private crypto tokens without scraping social media data. The malware connects to teneo’s websocket and sends ‘keep alive’ pings to earn points that translate into tokens.
The attacker appears to have previously used similar techniques to mine cryptocurrency. Researchers found that the attacker’s Docker container ran a Nexus Network client, which handles distributed compute tasks for crypto rewards. This approach highlights a shift away from highly detectable cryptojacking methods like XMRig. However, due to the private nature of the tokens involved, researchers are unable to determine how much cryptocurrency the attacker earned.
The malware campaign involves multiple layers of obfuscation to avoid detection.
After launching a container from Docker Hub, the malware deploys a Python script that runs a decoded payload. The payload is heavily obfuscated, using encoding functions and string manipulation to avoid signature-based analysis. Researchers believe this obfuscation is aimed at preventing analysts from decoding and detecting the attack.
Researchers have warned that Docker is a highly targeted service for cybercriminals and recommend improving security practices.
Docker allows for rapid deployment of applications but can be exploited to deploy malware if not properly secured. They advise system administrators to limit Docker’s exposure to the internet and implement authentication and firewalls to control access. Even brief exposure can lead to serious compromises, they noted.