Docker

Crypto mining campaign targets Docker environments with new evasion techniqueCrypto mining campaign targets Docker environments with new evasion technique

Crypto mining campaign targets Docker environments with new evasion technique

New malware campaign targets Docker environments using unknown methods to secretly mine cryptocurrency, researchers warn. Researchers from Darktrace and Cado…

4 weeks ago
Crooks are targeting Docker API servers to deploy SRBMinerCrooks are targeting Docker API servers to deploy SRBMiner

Crooks are targeting Docker API servers to deploy SRBMiner

Threat actors are targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances, Trend Micro warns. Trend…

7 months ago
Critical bug in Docker Engine allowed attackers to bypass authorization pluginsCritical bug in Docker Engine allowed attackers to bypass authorization plugins

Critical bug in Docker Engine allowed attackers to bypass authorization plugins

A critical flaw in some versions of Docker Engine can be exploited to bypass authorization plugins (AuthZ) under specific circumstances.…

10 months ago
Cryptojacking campaign targets exposed Docker APIs<gwmw style="display:none;"></gwmw>Cryptojacking campaign targets exposed Docker APIs<gwmw style="display:none;"></gwmw>

Cryptojacking campaign targets exposed Docker APIs<gwmw style="display:none;"></gwmw>

A malware campaign targets publicly exposed Docker API endpoints to deliver cryptocurrency miners and other payloads. Researchers at Datadog uncovered…

11 months ago
Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis serversLinux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers

Linux Malware targets misconfigured misconfigured Apache Hadoop, Confluence, Docker, and Redis servers

A new Linux malware campaign campaign is targeting misconfigured Apache Hadoop, Confluence, Docker, and Redis instances. Researchers from Cado Security…

1 year ago
Vulnerable Docker Installations Are A Playhouse for Malware AttacksVulnerable Docker Installations Are A Playhouse for Malware Attacks

Vulnerable Docker Installations Are A Playhouse for Malware Attacks

Uptycs researchers identified ongoing malicious campaigns through our Docker honeypot targeting exposed Docker API. The Uptycs Threat Research team has…

3 years ago
Lemon_Duck cryptomining botnet targets Docker serversLemon_Duck cryptomining botnet targets Docker servers

Lemon_Duck cryptomining botnet targets Docker servers

The Lemon_Duck cryptomining botnet is targeting Docker servers to mine cryptocurrency on Linux systems. Crowdstrikes researchers reported that the Lemon_Duck cryptomining botnet…

3 years ago
30 Docker images downloaded 20M times in cryptojacking attacks30 Docker images downloaded 20M times in cryptojacking attacks

30 Docker images downloaded 20M times in cryptojacking attacks

Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo…

4 years ago
Exploiting a bug in Azure Functions to escape DockerExploiting a bug in Azure Functions to escape Docker

Exploiting a bug in Azure Functions to escape Docker

Expert disclosed an unpatched vulnerability in Microsoft Azure Functions that could be exploited to escape the Docker container hosting them.…

4 years ago
TeamTNT botnet now steals Docker API and AWS credentialsTeamTNT botnet now steals Docker API and AWS credentials

TeamTNT botnet now steals Docker API and AWS credentials

Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS…

4 years ago