The Register: Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Source URL: https://www.theregister.com/2024/10/24/perfctl_malware_strikes_again/
Source: The Register
Title: Perfctl malware strikes again as crypto-crooks target Docker Remote API servers

Feedly Summary: Attacks on unprotected servers reach ‘critical level’
An unknown attacker is abusing exposed Docker Remote API servers to deploy perfctl cryptomining malware on victims’ systems, according to Trend Micro researchers.…

AI Summary and Description: Yes

Summary: The text highlights a significant security threat involving the exploitation of exposed Docker Remote API servers by attackers deploying cryptomining malware, specifically perfctl. Trend Micro researchers emphasize the urgency for organizations to strengthen their security measures against these vulnerabilities.

Detailed Description:

The report from Trend Micro outlines a pressing security issue surrounding the abuse of Docker Remote API servers. Criminals are exploiting these exposed servers to deploy cryptomining malware, which poses risks to Linux servers globally. Key points of the report include:

– **Nature of the Attack**:
– Attackers are using the Docker Remote API to deploy the perfctl cryptomining malware onto victim systems.
– Researchers have identified attempts to infiltrate systems through honeypots, reinforcing the malware’s widespread targeting.

– **Critical Level of Threat**:
– The exploitation of unprotected Docker Remote API servers has reached a “critical level,” prompting an immediate call for action from security professionals.
– Earlier reports indicated that a cryptojacking campaign exploiting similar vulnerabilities has persisted since early 2024.

– **Technical Mechanisms**:
– Attackers create a container based on the “ubuntu:mantic-20240405” base image, leveraging privileged and pid modes. This allows the malware to interact with host system processes.
– A two-part payload is executed via Docker Exec API, utilizing commands to escape the container and gain elevated privileges:
– The first part involves the `nsenter` command, granting access to various namespaces on the host.
– The second part executes a Base64-encoded shell script that perpetuates malware execution and establishes persistence.

– **Persistence and Evasion Techniques**:
– The malware utilizes a fallback function for continued operation, employing strategies to check for existing malicious processes and to avoid detection.
– It ultimately installs a persistent backdoor, enabling ongoing and unauthorized access to compromised machines.

– **Recommendations for Defense**:
– Strong emphasis on implementing robust access controls and authentication for Docker Remote API servers.
– Organizations are advised to monitor these servers for unusual behaviors, along with regular software patching, security audits, and adherence to container security best practices (e.g., avoiding “Privileged” mode and scrutinizing container configurations).

This report serves as a critical reminder for security and compliance professionals to bolster the defenses of their infrastructures, especially those involving cloud-native applications and containers, where vulnerabilities can lead to significant breaches and resource exploitation.