Bitcoin
$ 56,547
Ethereum
$ 1,984.0
Litecoin
$ 220.62
okex ads

CYBERSECURITY RESEARCHERS DETECT AMBITIOUS BTC MINING MALWARE CAMPAIGN TARGETING 1000s DAILY

Cybersecurity researchers have identified a persistent and ambitious campaign that targets thousands of Docker servers daily with a Bitcoin (BTC) miner.

Aqua Security issued a threat alert over the attack in a report published earlier this month, which has ostensibly “been going on for months, with thousands of attempts taking place nearly on a daily basis.” The researchers said that “These are the highest numbers we’ve seen in some time, far exceeding what we have witnessed to date.”

Such scope and ambition indicate that the illicit Bitcoin mining campaign is unlikely to be “an improvised endeavor,” as the actors behind it must be relying on significant resources and infrastructure.

Using its virus analysis tools, Aqua Security has identified the malware as a Golang-based Linux agent, known as Kinsing. The malware propagates by exploiting misconfigurations in Docker API ports. It runs an Ubuntu container, which downloads Kinsing and then attempts to spread the malware to further containers and hosts.

The campaign’s end-goal — achieved by first exploiting the open port and then carrying through with a series of evasion tactics — is to deploy a crypto miner on the compromised host, the researchers say.

Aqua’s study provides detailed insight into the components of the malware campaign, which stands out as a forceful example of what the firm claims is “the growing threat to cloud native environments.”

Attackers are upping their game to mount ever more sophisticated and ambitious attacks, thee researchers note. In response, enterprise security teams need to develop a more robust strategy to mitigate these new risks.

Among their recommendations, Aqua proposes that teams identify all cloud resources and group them in a logical structure, review their authorization and authentication policies, and adjust basic security policies according to a principle of “least privilege.”

Teams should also investigate logs to locate user actions that register as anomalies, as well as implement cloud security tools to strengthen their strategy.

Last month, Singapore-based unicorn startup Acronis published the results of its latest cybersecurity survey. It revealed that 86% of IT professionals are concerned about cryptojacking — the industry term for the practice of using a computer’s processing power to mine for cryptocurrencies without the owner’s consent or knowledge.

Related Posts

Leave a Reply

Newsletter

Subscribe To Newsletter

For updates and exclusive offers, enter your e-mail below.

Popular Posts

North Korean Hackers Threatened Bithumb Exchange With a $16M Ransom Amid the 2017 Data Breach, Says Report
April 7, 2021By
Russian Oil and Gas Giant Completes Trial Blockchain-Based Smart Fueling System
April 7, 2021By
BitGo Receives Trust License From New York Regulators
April 7, 2021By

Advertisement

Video Posts

In
Tech Adoption For Small Business
April 6, 20210
In
OKEx Nigeria Exclusive Summit 2021
April 6, 20210

Crypto Stats


CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin56,547 0.82 % 3.86 % 3.62 %
Ethereum1,984.0 0.22 % 6.58 % 7.81 %
Binance Coin373.29 1.96 % 3.22 % 20.64 %
Tether1.000 0.13 % 0.19 % 0.08 %
Polkadot43.88 0.58 % 0.43 % 36.39 %
Cardano1.190 1.15 % 4.36 % 1.78 %
XRP0.9087 0.40 % 10.92 % 60.39 %
Uniswap28.75 0.92 % 10.55 % 0.73 %
Litecoin220.62 1.96 % 6.38 % 12.72 %
Chainlink31.78 1.70 % 6.68 % 14.45 %