Cryptomining Attack Exploits Docker API Misconfiguration Since 2019 (2024)

Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.

Hackers behind a cryptomining campaign have managed to avoid detection since 2019. The attacks exploited misconfigured Docker APIs that allowed them to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency, researchers said.

The attack technique is script-based and dubbed “Autom”, because it exploits the file “autom.sh”. Attackers have consistently abused the API misconfiguration during the campaign’s active period, however the evasion tactics have varied – allowing adversaries to fly under the radar, wrote Aquasec’s research arm Team Nautilus in a report published Wednesday.

Attackers hit honeypots set up by Team Nautilus 84 times since 2019, with 22 attacks in 2019, 58 in 2020, and four in 2021 before researchers began writing up their report in October, researchers said. Researchers also report attacks on honeypots decreased significantly this year, while overall targeting of poorly configured Docker APIs did not, according to a Shodan search, researchers noted.

“This decrease in attacks on our honeypots might imply that the attackers identified them and therefore reduced the volume of their attacks in 2021,” they wrote.

Though attackers use the same entry point and tactics to achieve their ultimate goal of cryptomining during the attack vector, what changed most about the attack over the years is how threat actors constantly have evolved evasive maneuvers to avoid detection, researchers said.

“We saw the progression of the campaign in the tactics that the adversaries use to avoid detection,” they wrote in the report.

Attackers also have used five different servers to download the shell script that initiates the attack since they started, they said. “It seems that the group behind the attack has developed their skills to expand the attack surface and spread their attack,” researchers wrote.

Attack Breakdown

Team Nautilus first observed the attack in 2019 when a malicious command was executed during the run of a vanilla image alpine:latest, which downloaded the autom.sh shell script, they said in the report. Adversaries commonly use vanilla images along with malicious commands to perform attacks because most organizations trust these images and allow their use, researchers explained.

Attackers consistently have used the same entry point for the attack, which is executed from a remote server that searches for vulnerable hosts to exploit misconfigured Docker APIs, they wrote.

Then they run the vanilla image and subsequent malicious shell, which creates a user by two methods—adduser, which adds users by setting up the account’s home folder and other settings, and useradd, a low-level utility command for adding users–under the name akay.

Since the newly created user is not privileged, the threat actors elevate privileges by using the “sudo” prefix and then turns it into a root user, which grants unlimited privileges to run any command sudoers file. This controls how sudo works on a targeted machine, basically making the threat actor a superuser, researchers wrote.

Attackers then use the domain icanhazip[.]com to get the public IP address of the compromised host and use it to download a file from the remove server. Through these series of steps, attackers install a backdoor that grants them persistence on the compromised host to stealthily mine cryptocurrency, researchers wrote.

Evasive Maneuvers

While attackers have barely changed how they gain entry and achieve persistence on victims’ machines since they started the Autom campaign, they have changed two things–the server from which the shell script autom.sh was downloaded and, more notably, specific evasion tactics, researchers said.

To the latter point, Team Nautilus has observed the campaign evolving from having no “special techniques” for hiding its nefarious business in 2019 to adding more complex concealment tactics over the next two years, researchers said.

In 2020, they disabled a number of security mechanisms to stay hidden, including ufw (Uncomplicated Firewall), which enables users to allow or deny access to a service and NMI (non-maskable interrupt), which is the highest-priority interrupt that typically occurs to signal attention for non-recoverable hardware errors and is used to monitor system resets.

This year, attackers added a new technique to hide the cryptomining activity by downloading an obfuscated shell script from a remote server, researchers said.

“They encoded the script in base64 five times to prevent security tools from reading it and understanding the intentions behind it,” they wrote. “Decoding the script revealed the mining activity.”

Other concealment capabilities added over the course of the campaign included downloading the log_rotate.bin script, which launches the cryptomining activity by creating a new cron job that will initiate mining every 55 minutes on the compromised host, researchers added.

“The Autom campaign illustrates that attackers are becoming more sophisticated, continually improving their techniques and their ability to avoid detection by security solutions,” they observed.

Cryptomining Attack Exploits Docker API Misconfiguration Since 2019 (2024)

FAQs

How can users protect their IoT devices from cryptojacking attacks? ›

One such strategy is to ensure that all IoT devices are properly secured with strong passwords and the latest security updates. Another strategy is to use anti-malware software that can detect and prevent cryptojacking attacks.

What is cryptomining protection? ›

What is Cryptomining Protection? Bitdefender's Cryptomining Protection feature defends Windows computers against the growing threat of unauthorized crypto-mining activities, a malicious practice that exploits a user's resources and electricity to generate revenue for attackers.

How to tell if someone is mining bitcoin on your computer? ›

One of the most telltale signs of cryptojacking or malware infection is a sudden and unexplained spike in CPU usage. Since crypto mining requires significant computational power, an infected device will often show high CPU usage even when not performing any intensive tasks.

How do you know if you have been cryptojacked? ›

Check to See if Your Browser Is Secretly Still Running

Cryptojackers typically run through your browser and can create a tiny “pop-up” browser window that hides behind your Start button or toolbar, so it can continue to consume computer resources even after you think you've closed your browser.

How do I block Cryptomining? ›

Protect against cryptomining
  1. Keep your devices and software updated. ...
  2. Install software from reputable sources. ...
  3. Avoid suspicious websites. ...
  4. Use ad blockers in your browser. ...
  5. Disable JavaScript in your browser. ...
  6. Endpoint protection.
Jan 26, 2024

Is cryptomining protection worth it? ›

For users who want to run legitimate cryptomining activities, but prevent unauthorized access from abusing their resources, Cryptomining Protection acts as a unique management tool, enabling them to monitor and decide what should be kept running and what should be prevented.

How illegal is cryptojacking? ›

Cryptojacking might seem like a harmless crime, since the only thing 'stolen' is the power of the victim's computer. But the use of computing power for this criminal purpose is done without the knowledge or consent of the victim, for the benefit of the criminal who is illicitly creating currency.

How can we protect against IoT attacks? ›

Set strong passwords.

If hackers manage to guess or acquire your password for one device, it could potentially grant them access to all devices sharing that password. Employing secure, hard-to-guess passwords offers the best possible defense against these types of threats.

How can we secure IoT devices? ›

Cybersecurity best practices for IoT security, within an organization, include:
  • Guard your Assets. ...
  • Set a Monitoring System. ...
  • Encrypt your Connection. ...
  • Actively monitor IoT devices. ...
  • Differentiate your product. ...
  • Use Multi-Factor Authentication. ...
  • Adopt secure password practice. ...
  • Continue to patch and update firmware.
Apr 6, 2023

How can you secure an IoT device? ›

Stay proactive with IoT security

Be sure to use strong passwords, multi-factor authentication, and encryption for your devices and applications. Manage both active and inactive devices, being sure to always patch the ones you're using and disconnect the ones you aren't.

What is cryptojacking and how do you prevent it? ›

Cryptojacking is when hackers run malware on other people's hardware to secretly mine cryptocurrency. This normally requires considerable processing power, but cryptojacking attacks allow hackers to mine cryptocurrency quickly and efficiently, without having to use their own computing resources.

Top Articles
Latest Posts
Article information

Author: Amb. Frankie Simonis

Last Updated:

Views: 5680

Rating: 4.6 / 5 (56 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Amb. Frankie Simonis

Birthday: 1998-02-19

Address: 64841 Delmar Isle, North Wiley, OR 74073

Phone: +17844167847676

Job: Forward IT Agent

Hobby: LARPing, Kitesurfing, Sewing, Digital arts, Sand art, Gardening, Dance

Introduction: My name is Amb. Frankie Simonis, I am a hilarious, enchanting, energetic, cooperative, innocent, cute, joyous person who loves writing and wants to share my knowledge and understanding with you.