'Commando Cat' Is Second Campaign of the Year Targeting Docker
The threat actor behind the campaign is still unknown, but it shares some similarities with other cyptojacking groups.
In findings released by Cado researchers, they discovered a malware campaign, coined "Commando Cat," which is targeting exposed Docker API endpoints.
The cryptojacking campaign has only been active since the beginning of this year but it's the second one targeting Docker. The first one used the 9hits traffic exchange application, according to the researchers. However, these Docker attacks aren't necessarily rare, especially in cloud environments.
"This campaign demonstrates the continued determination attackers have to exploit the service and achieve a variety of objectives," the researchers said. "Commando Cat is a cryptojacking campaign leveraging Docker as an initial access vector and (ab)using the service to mount the host's filesystem, before running a series of interdependent payloads directly on the host."
It is unclear who the threat actor behind Commando Cat is or where they're from, though there is an overlap in scripts and IP addresses to other groups like Team TNT, indicating a potential connection or a copycat.
Because of the level of redundancy and the amount of evasion, the campaign is sophisticated in how it conceals itself. Acting as a credential stealer, backdoor, and cryptocurrency miner together as one, it makes for a highly stealthy and malicious threat.
About the Author
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024