Post

Crypto Mining Campaign Targets Docker Environments with New Evasion Technique

Researchers at Darktrace and Cado Security have uncovered a sophisticated cryptojacking campaign targeting Docker environments. The attack leverages a novel technique to mine cryptocurrency covertly, bypassing traditional detection methods. Discover the intricate layers of obfuscation and the potential implications for Docker security.

Crypto Mining Campaign Targets Docker Environments with New Evasion Technique

TL;DR

A new cryptojacking campaign has been discovered targeting Docker environments. The malware uses advanced obfuscation techniques to mine cryptocurrency covertly, highlighting the evolving tactics of cybercriminals.

Main Content

Researchers from Darktrace and Cado Security have identified a sophisticated malware campaign targeting Docker environments. This campaign employs a novel technique to secretly mine cryptocurrency, highlighting the evolving tactics of cybercriminals1.

Malware Campaign Overview

The malware campaign targets Docker environments to deploy a malicious node connected to Teneo, a decentralized infrastructure network. Teneo allows users to earn rewards (Teneo Points) by running Community Nodes that scrape public data from social platforms like Facebook, X, Reddit, and TikTok. These points can be converted to $TENEO tokens, which the malware covertly monetizes1.

Attack Chain Analysis

The attack begins with a request to launch a container from Docker Hub, specifically the kazutod/tene:ten image. Researchers analyzed this malicious Docker image by pulling and saving it as a tar file for easier inspection. Upon extracting the tar file, experts found that the image uses the OCI format, where contents are organized in layers1.

“The Docker image uses the OCI format, which is different from a regular file system. Instead of having a static folder of files, the image consists of layers. Each layer is stored as a tar file, along with a JSON metadata file.”

Obfuscation Techniques

The ten.py script included in the malicious Docker image is heavily obfuscated using multiple layers of base64 encoding, zlib compression, and string reversal. The script decodes and executes a payload repeatedly, requiring 63 iterations before the actual malicious code is revealed. Despite the complex obfuscation process, the decoding process was easily automated, suggesting the effort was meant to deter casual analysis rather than seriously hinder experts1.

Evasion Tactics

The malicious script connects to teneo[.]pro, but instead of scraping, it sends fake keep-alive pings to earn “Teneo Points” based on activity levels. This tactic allows the malware to evade common detection techniques for XMRig-based cryptojacking attacks. The attacker’s DockerHub profile suggests similar abuse of decentralized compute networks. However, due to the closed nature of private tokens like Teneo, it’s unclear how profitable this method is1.

Additional Observations

The attacker’s DockerHub profile shows a pattern of abuse, with their latest container running a Nexus network client to earn crypto via distributed zero-knowledge compute tasks1.

“Translating a user ID to a wallet address does not appear to be possible, and there is limited public information about the tokens themselves.”

Conclusion

This campaign highlights the evolving tactics of cryptojacking attacks, where attackers are shifting to alternative methods of generating crypto to evade detection. The profitability of these methods remains uncertain due to the closed nature of private tokens.

References

Additional Resources

For further insights, check:

This post is licensed under CC BY 4.0 by the author.