Attribute | Details |
---|---|
Threat Actors | Unspecified threat actors targeting cloud environments |
Campaign Overview | Surge in cryptojacking campaigns targeting Docker and Kubernetes environments |
Target Regions | Finance, Healthcare, Technology sectors, global cloud infrastructures |
Methodology | Exploiting exposed Docker API endpoints, lateral movement across containers, cryptocurrency mining |
Product Targeted | Docker, Kubernetes environments, high-performance cloud infrastructure |
Malware Reference | Cryptocurrency mining malware targeting Monero |
Tools Used | Open API endpoints, malicious containers, cryptocurrency mining tools (XMRig) |
Vulnerabilities Exploited | Exposed Docker API endpoints, misconfigurations, lack of authentication |
TTPs | Initial exploitation, lateral movement, privilege escalation, execution, persistence |
Attribution | Not specified, ongoing cryptojacking operations in container-based environments |
Recommendations | Secure Docker/Kubernetes APIs, implement monitoring for container activity, resource constraints |
Source | SOCRadar |
Read full article: https://socradar.io/blog-cryptojacking-campaign-targets-docker-and-kubernetes-surge-in-container-based-attacks/
The above summary has been generated by an AI language model
Leave a Reply