Docker APIs across the internet are being targeted by a merciless new crytpojacking campaign

Crypto mining
Kryptovaluuttojen louhinta on tehokkainta oikeilla komponenteilla. (Image credit: Shutterstock / Yevhen Vitte)

Cybersecurity researchers from Cado Security recently discovered an advanced new cryptojacking campaign that targets exposed Docker API endpoints over the internet

The campaign, called “Commando Cat”, has been active since early 2024, the researchers added, saying that this was the second such campaign to be discovered in just two months.

According to the report, the attackers would deliver an interdependent payload from their own server, leveraging Docker as an initial access vector. The first container, built using the Commando open-source tool, is seemingly benign, but allows the attackers to escape the container and run multiple payloads on the Docker host itself.

Copycats

The payloads delivered depend on the short-term goals of the campaign, and include establishing persistence, backdooring the host, exfiltrating cloud service provider credentials, and launching cryptocurrency miners, the researchers explained. The cryptocurrency miner being deployed as part of this campaign is the infamous XMRig, a hugely popular cryptojacker that mines Monero (XMR), a privacy-oriented currency that’s almost impossible to trace.

Commando cat uses a different folder to temporarily store stolen files, Cado Security’s researchers added, suggesting this was done as an evasion mechanism. Indeed, this makes forensic analysis more challenging, they said. 

At press time, the researchers don’t know who the threat actors behind Commando Cat are, but say they noticed overlaps in shell scripts and C2 IP addresses with another cryptojacking group called TeamTNT. Still, Cado doesn’t believe TeamTNT to be behind this particular campaign, and rather leans towards a copycat group. 

To defend against such attacks, users are advised to update their Docker instances and implement necessary security measures, the researchers concluded.

Earlier this month, the same cybersecurity team discovered a similar campaign, targeting vulnerable Docker hosts to deploy both XMRig and the 9Hits Viewer software. 9hits is a web traffic exchange platform, where users can drive traffic among themselves. When a user installs 9hits, their device visits other members’ websites via a headless Chrome instance. In exchange, the user receives credits which they can then spend to drive traffic to their own sites. By installing 9hits on compromised Docker instances, the attackers generate additional credits which they can then exchange for more traffic for themselves. 

Via The Hacker News

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Abstract image of cyber security in action.
MassJacker malware targets those looking for pirated software
China
Chinese hackers develop effective new hacking technique to go after business networks
A computer being guarded by cybersecurity.
Huge cyberattack found hitting vulnerable Microsoft-signed legacy drivers to get past security
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Cisco, ASUS, QNAP, and Synology devices hijacked to major botnet
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras