A new technique builds and deploys an attack on the victim's own system
Researchers have discovered a new technique that lets an attacker to build and deploy an image on a victim's host. The attack exploits a misconfigured Docker API port to build and run a malicious container image on the host.
In the observed attack, the adversary used a Docker SDK for Python package to send commands to a misconfigured Docker API. The aim, in the observed instance, was to execute a resource-hijacking attack using a cryptominer.
Assaf Morag of Team Nautilus, Aqua's cybersecurity research team, observed this technique. He points out that because the attack builds and executes malicious code on the victim's host, most defense tools are ineffective because they tend to scan malicious code coming in from outside the network perimeter. Morag says network-level detection/prevention security scanning could be effective in stopping the attack by disrupting communications with the C2 server. Ongoing dynamic threat analysis is another recommended strategy for defense.
For more, read here.
Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for detail on conference information and to register.
About the Author(s)
You May Also Like
Defending Against Today's Threat Landscape with MDR
April 18, 2024The fuel in the new AI race: Data
April 23, 2024Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024