Article Details
Scrape Timestamp (UTC): 2025-09-09 19:19:44.019
Original Article Text
Click to Toggle View
Hackers hide behind Tor in exposed Docker API breaches. A threat actor targeting exposed Docker APIs has updated its malicious tooling with more dangerous functionality that could lay the foundation for a complex botnet. The activity was first reported in June by cybersecurity company Trend Micro. whose researchers analyzed scripts and malicious code that dropped a cryptominer and relied on the Tor network to hide their identity. Akamai researchers discovered new tooling that does not deploy a miner but a more complex payload that can block access to compromised Docker APIs. Infection chain The attackers search for exposed Docker API (port 2375) on a vulnerable host and send a container creation request using a modified Alpine Linux image that includes a base64-encoded shell command. The container executes the decoded shell command, which installs curl and tor, launches a Tor daemon in the background, and waits for the confirmation of the connection by accessing Amazon's checkip.amazonaws.com service over a SOCKS5 proxy. Once Tor is active, the container downloads and executes a second-stage shell script (docker-init.sh) from a Tor hidden service using curl. The docker-init.sh script enables persistent SSH access by appending an attacker-controlled public key to /root/.ssh/authorized_keys on the mounted host filesystem. It writes a base64-encoded cron job on the host, which executes every minute and blocks external access to port 2375 using whichever firewall utility is available (iptables, nftables, ufw, etc.). Additionally, it installs tools like masscan, zstd, libpcap, and torsocks to support scanning, propagation, and evasion. Next, the malware downloads a Zstandard-compressed Go binary (system-linux-ARCH.zst) over Tor, decompresses it to /tmp/system, grants execute permissions, and runs it. The Go binary functions as a dropper, extracting and executing an embedded second-stage binary, and parses the host’s utmp file to identify logged-in users. Botnet building behavior The binary scans for other exposed Docker APIs, attempts to infect them via the same container creation method, and removes competitor containers after gaining access. This self-replication mechanism is a core trait of botnet agents that typically infect new nodes autonomously, without requiring external direction. Akamai highlights the presence of inactive logic for exploiting Telnet (port 23) using default router credentials and for interacting with Chrome’s remote debugging interface (port 9222). This suggests potential future expansion opportunities for credential theft, browser session hijacking, remote file download, and distributed denial-of-service (DDoS) attacks. “Some of the underlying mechanisms lead us to believe this variant is an initial version of a complex botnet,” Akamai's researchers say, noting that they “have not found a complete version of it so far.” Akamai’s discovery shows evolution from opportunistic Docker exploitation into a multi-vector threat with capabilities for lateral movement, persistence, and (dormant for now) options for credential theft and browser hijacking. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Cybersecurity firms Trend Micro and Akamai report on new threats targeting exposed Docker APIs, evolving from cryptomining to more complex botnet capabilities.
Attackers utilize Tor to conceal identities, deploying modified Alpine Linux images to execute malicious code on vulnerable Docker hosts.
The infection process involves installing tools for scanning and propagation, enabling persistent SSH access, and blocking external access to Docker APIs.
A Zstandard-compressed Go binary is used as a dropper, facilitating further malware deployment and autonomous node infection.
Researchers note inactive logic for potential future exploits, including Telnet and Chrome’s remote debugging interface, indicating possible expansion into credential theft and DDoS attacks.
The findings suggest a shift from opportunistic Docker exploitation to a sophisticated multi-vector threat with capabilities for lateral movement and persistence.
Organizations are advised to secure Docker API endpoints and monitor for unusual network activity to mitigate potential botnet formation risks.