Press ESC to close

Cryptojacking Campaign Targets Docker and Kubernetes: Surge in Container-Based Attacks

Attribute Details
Threat Actors Unspecified threat actors targeting cloud environments
Campaign Overview Surge in cryptojacking campaigns targeting Docker and Kubernetes environments
Target Regions Finance, Healthcare, Technology sectors, global cloud infrastructures
Methodology Exploiting exposed Docker API endpoints, lateral movement across containers, cryptocurrency mining
Product Targeted Docker, Kubernetes environments, high-performance cloud infrastructure
Malware Reference Cryptocurrency mining malware targeting Monero
Tools Used Open API endpoints, malicious containers, cryptocurrency mining tools (XMRig)
Vulnerabilities Exploited Exposed Docker API endpoints, misconfigurations, lack of authentication
TTPs Initial exploitation, lateral movement, privilege escalation, execution, persistence
Attribution Not specified, ongoing cryptojacking operations in container-based environments
Recommendations Secure Docker/Kubernetes APIs, implement monitoring for container activity, resource constraints
Source SOCRadar

Read full article: https://socradar.io/blog-cryptojacking-campaign-targets-docker-and-kubernetes-surge-in-container-based-attacks/

The above summary has been generated by an AI language model

Source: SOCRadar

Published on: December 11, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *