{"id":41172,"date":"2020-07-30T10:49:14","date_gmt":"2020-07-30T10:49:14","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=5e8aa5c5deae3fe7f086b5dd32738995"},"modified":"2020-07-30T10:49:14","modified_gmt":"2020-07-30T10:49:14","slug":"doki-malware-attacks-docker-servers-using-dogecoin","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/doki-malware-attacks-docker-servers-using-dogecoin\/","title":{"rendered":"&#8216;Doki&#8217; malware attacks Docker servers using Dogecoin"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">30 Jul, 2020<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p><span><a href=\"https:\/\/www.itpro.co.uk\/malware\/28076\/what-is-malware\"  class=\"polaris__link\">Malware<\/a>\u00a0that has remained undetected for six months is exploiting misconfigured Docker API ports to launch malicious payloads, while abusing the Dogecoin cryptocurrency blockchain in the process.<\/span><\/p>\n<p><span>The malware, known as \u2018Doki\u2019, is targeting misconfigured containerised environments hosted on Azure, AWS, and a number of other major cloud platforms, according to\u00a0<a href=\"https:\/\/www.intezer.com\/container-security\/watch-your-containers-doki-infecting-docker-servers-in-the-cloud\/\"  class=\"polaris__link -is-external\" rel=\"noopener\">Intezer researchers<\/a>, with attackers able to find publicly accessible\u00a0<a href=\"https:\/\/www.itpro.co.uk\/development\/containers\/354652\/getting-started-with-docker\"  class=\"polaris__link\">Docker<\/a>\u00a0API ports and exploit them to establish their own containers.<\/span><\/p>\n<div class=\"polaris__related-links\">\n<p><span>Doki is then able to instal\u00a0malware on targeted infrastructure based on code received from its operators, spawning and deleting containers during the process.<\/span><\/p>\n<div class=\"polaris__ad -full-width -rendered-ad-slot hide-desktop\">\n<div class=\"polaris__ad--inner\">\n<div class=\"polaris__simple-grid--main\">\n<p><span>Doki serves as an undetectable Linux backdoor, and represents an evolution of the two-year-old Ngrok Botnet campaign. Alarmingly, it has also managed to evade every one of the 60 malware platforms listed on\u00a0<a href=\"https:\/\/www.itpro.co.uk\/642751\/google-acquires-online-security-startup-virustotal\"  class=\"polaris__link\">VirusTotal<\/a>\u00a0since it was first analysed in January 2020.<\/span><\/p>\n<p><span>This particular strain is unusual in the sense that it abuses the Dogecoin\u00a0<a href=\"https:\/\/www.itpro.co.uk\/technology\/cryptocurrencies\/354811\/how-safe-are-cryptocurrencies\"  class=\"polaris__link\">cryptocurrency blockchain<\/a>\u00a0in order to attack these containerised environments.<\/span>\u00a0The attackers use a fairly\u00a0ingenious method to prevent the botnet infrastructure from being taken down, which involves\u00a0dynamically changing the command and control (C2) server&#8217;s domain based on the transactions recorded on a Dogecoin wallet.<\/p>\n<p>The C2 domain address, from which the payload is sent, changes based on the amount of Dogecoin in the wallet at any given\u00a0time. When a cryptocurrency is added or removed from the wallet, the system encodes the transaction and creates a new unique address from which they can control the Doki malware.<\/p>\n<\/div>\n<div class=\"polaris__simple-grid--full\">\n<div class=\"polaris__ad -full-width -empty-ad-slot\">\n<div class=\"polaris__ad--inner\">\n<div id=\"bling-5\">\n<div id=\"google_ads_iframe_\/359\/itpro.co.uk\/software\/development\/containers_8__container__\">\n<p>Because of the secure and decentralised nature of Blockchain, this infrastructure can&#8217;t be taken down by law enforcement, and new addresses can&#8217;t be pre-empted by others as only the attackers can make transactions on their Dogecoin wallet.<\/p>\n<div class=\"polaris__newsletter -light\">\n<form action=\"https:\/\/dennis.slgnt.eu\/optiext\/optiextension.dll?ID=MofMeN7jyuGShLcNaQZjt2R0PrNwdl85y9epNKwQKD67qFo2wdgsw249hZyuiJDnRzk5WqgEIoBCgWhEqf&amp;BRANDS_NEWSLETTERIDS=CHP_STD,CLP_STD,ITP_USA,ITP_T20,ITP_TBB&amp;NEWSLETTER_ID=ITP_STD&amp;SUBSCRIBE_SOURCE=web0003itp&amp;BRAND_CODE=ITP\"  method=\"post\" class=\"polaris__form\">\n<div class=\"polaris__newsletter--form\">\n<div class=\"polaris__newsletter--headings\" data-gtm-vis-recent-on-screen-13282986_53=\"49327\" data-gtm-vis-first-on-screen-13282986_53=\"49327\" data-gtm-vis-total-visible-time-13282986_53=\"100\" data-gtm-vis-has-fired-13282986_53=\"1\">\n<p><span>\u201cLinux threats are becoming more common. A contributing factor to this is the increasing shift and reliance on cloud environments, which are mostly based on Linux infrastructure,\u201d\u00a0said researchers Nicole Fishbein and Michael Kajiloti. \u201cHence, attackers have been adapting accordingly with new tools and techniques designed specifically for this infrastructure.\u201d<\/span><\/p>\n<p><span>Historically, the Ngrok Botnet has been one of the most prevalent threats abusing misconfigured Docker API ports in such a way to execute malware, they added. As part of the attack, the hackers would abuse Docker configuration features to elude container restrictions and execute various payloads from the host.<\/span><\/p>\n<p><span>Such threats also deploy network scanners to identify the cloud providers\u2019 IP ranges for additional potentially vulnerable targets. What makes it so dangerous is that it only takes a few hours from when a misconfigured Docker server is online to become infected.<\/span><\/p>\n<div class=\"polaris__ad -full-width -rendered-ad-slot hide-desktop\">\n<div class=\"polaris__ad--inner\">\n<div class=\"polaris__ad--label\">\n<p><span>Meanwhile, because the cryptocurrency blockchain the hackers abuse is immutable and decentralised, Fishbein and Kajiloti added, the method is resistant to infrastructure takedowns as well as domain filtering attempts.<\/span><\/p>\n<p><span>Hackers can create any container as part of the attack, and execute code from the host machine by exploiting a container escape method. This is based on creating a new container, which is achieved by posting a \u2018create\u2019 API request.<\/span><\/p>\n<p><span><a href=\"https:\/\/www.itpro.co.uk\/development\/containers\/356391\/the-rise-of-containers\"  class=\"polaris__link\">Each container<\/a>\u00a0is based on an alpine image with curl installed, which isn\u2019t malicious in and of itself, rather it\u2019s abused to execute the attack with curl commands, activated as soon as the container\u2019s up and running.<\/span><\/p>\n<div class=\"polaris__resource-list -float\">\n<p><span>Hackers then abuse the Ngrok service, which provides secure tunnels connecting between local servers and the public internet, to craft unique URLs with a short lifetime, using them to download payloads during the attack by passing them to the curl-based image.<\/span><\/p>\n<p><span>\u201cThe Ngrok Botnet campaign has been ongoing for over two years and is rather effective, infecting any misconfigured Docker API server in a matter of hours,\u201d added Nicole Fishbein and Michael Kajiloti. \u201cThe incorporation of the unique and undetected Doki malware indicates the operation is continuing to evolve.<\/span><\/p>\n<\/div>\n<\/div>\n<div id=\"bling-7\" data-google-query-id=\"CP7Rm5fm9OoCFTnluwgdhl8MYg\">\n<p><span>\u201cThis attack is very dangerous due to the fact the attacker uses container escape techniques to gain full control of the victim\u2019s infrastructure. Our evidence shows that it takes only a few hours from when a new misconfigured Docker server is up online to become infected by this campaign.\u201d<\/span><\/p>\n<p><span>The researchers have recommended that both companies and individuals who own cloud-based container servers must immediately fix their configuration settings to prevent exposure to the threat. This process includes checking for any exposed ports, verifying there are no foreign or unknown containers among existing containers, and monitoring excessive use of computing resources.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/form>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"polaris__simple-grid--main\">\n<div class=\"polaris__ad -full-width -rendered-ad-slot hide-desktop\">\n<div class=\"polaris__ad--inner\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        30 Jul, 2020    <\/p>\n<p>      Malware\u00a0that has remained undetected for six months is exploiting misconfigured Docker API ports to launch malicious payloads, while abusing the Dogecoin cryptocurrency blockchain in the &#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41172","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41172"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41172\/revisions"}],"predecessor-version":[{"id":41173,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41172\/revisions\/41173"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}