Friday, November 1, 2024
HomeComputer SecurityKinsing Malware Attacks Misconfigured Open Docker Daemon API Ports

Kinsing Malware Attacks Misconfigured Open Docker Daemon API Ports

Published on

Malware protection

A new malware dubbed Kinsing attacks targeting container environments, the attack particularly targets the misconfigured open Docker Daemon API ports.

The campaign active for months and thousands of containers targeted every day. Researchers from Aquasec observed the attacks.

Researchers believe that “these attacks are directed by actors with sufficient resources and the infrastructure needed to carry out and sustain such attacks”.

- Advertisement - SIEM as a Service

Kinsing Malware Attack

The malware exploits the misconfigured Docker API port and runs a malicious Ubuntu container which contains a kinsing malicious malware.

Once exploited it runs a cryptominer and attempts to spread the malware to other containers and hosts. The end goal of the malware attack is to deploy cryptominer.

The attack with the campaign is always the same, but only the IP addressed changes with every attack.

The attempts to connect with C&C servers in Eastern Europe with IP 91[.]215[.]169[.]111 over the port 80 and sends small encrypted messages at regular intervals.

It connects with the server with the IP 193[.]33[.]87[.]219 to download the cryptominer payload and for C&C communication.

The lateral movement handled by a spre.sh shell script that spreads the malware across the container network.

Kinsing Malware

The last stage of the malware is to deploy a cryptominer called kdevtmpfsi, it further communicates with the IP 193[.]33[.]87[.]219 and starts the mining process.

“This attack stands out as yet another example of the growing threat to cloud-native environments. With deployments becoming larger and container use on the rise, attackers are upping their game and mounting more ambitious attacks,” reads Aquasec blog post.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling...