Cryptomining botnet targeting Docker on Linux systems

LemonDuck crew deploy deceptive tactics to evade detection and anonymize mining operations.

CSO  >  Botnet  >  Robots amid a blue binary matrix
Tampatra / Bannosuke / Getty Images

LemonDuck, a well-known cryptomining botnet, is targeting Docker on Linux systems to coin digital money, CloudStrike reported Thursday.

The company's threat research team revealed in a blog written by Manoj Ahuje that the botnet is leveraging Docker APIs exposed to the internet to run malicious containers on Linux systems.

Docker is used to build, run, and mange containerized workloads. Since it runs primarily in the cloud, a misconfigured instance can expose a Docker API to the internet where it can be exploited by a threat actor, who can run a crypto miner inside an outlaw container.

Docker containers a soft target

Mike Parkin, an engineer at Vulcan Cyber, a provider of SaaS for enterprise cyber risk remediation, explains that one of the main ways attackers compromise containerized environments is through misconfigurations, which just shows how many organizations are failing to follow industry best practices.

"There are tools available that can protect these environments from unauthorized use, and workload monitoring tools that can flag unusual activity," he says in an interview. "The challenge can be coordinating between the development teams and the security teams, but there are risk management tools that can handle that as well."

Ratan Tipirneni, president and CEO of Tigera, a provider of security and observability for containers, Kubernetes, and cloud, adds that while Docker provides a high degree of programmability, flexibility, and automation it has an unintended side effect of increasing the attack surface.

"This is especially true as container technologies get adopted more broadly by the mainstream market," he says in an interview. "This creates a soft target for adversaries to compromise Docker, since it unlocks a lot of compute power for cryptomining."

How LemonDuck works

After running its malicious container on an exposed API, LemonDuck downloads an image file named core.png disguised as a bash script, Ahuje explains. Core.png acts as a pivot point for setting up a Linux cronjob, which can be used to schedule scripts or other commands to run automatically.

The cronjob is then used to download a disguised file called a.asp, which is actually a bash file. If a system is using the Alibaba Cloud's monitoring service— which can detect cloud instances for malicious activities if its agent is installed on a host or container—a.asp can disable it to avoid detection by a cloud provider.

A.asp also downloads and runs XMRig as an xr file that mines the cryptocurrency. XMRig is deceptive because it uses a cryptomining proxy pool. "Proxy pools help in hiding the actual crypto wallet address where the contributions are made by current mining activity," Ahuje writes.

LemonDuck's attack technique is a stealthy one. Rather than mass scanning the public IP ranges for exploitable attack surface, it tries to move laterally by searching for SSH keys. "This is one of the reasons this campaign was not as evident as other mining campaigns run by other groups," Ahuje notes. Once SSH keys are found, he continues, the attacker uses those to log in to the servers and run their malicious scripts.

Cloud attacks maturing

Ian Ahl, vice president of threat research and detection engineering at Permiso, a cloud security software company, observes that "While not uncommon, the disabling of cloud monitoring services such as Alibaba’s Cloud Defense by the malware shows an understanding of cloud environments."

"Targeting Docker services is niche, though not unexpected," he says in an interview. "As cloud environments mature, so too do the attacks against them. LemonDuck is also particularly territorial. It disables competing malware if it’s found."

"Aside from the maturity and understanding of cloud environments, it is an otherwise unremarkable cryptocurrency miner," he adds.

CrowdStrike’s Ahuje explains that the cryptocurrency boom, combined with cloud and container adoption in enterprises, have been a monetarily attractive option for attackers. Since cloud and container ecosystems heavily use Linux, it's attracted the attention of the operators of botnets like LemonDuck.

"At CrowdStrike," Ahuje writes, "we expect such kinds of campaigns by large botnet operators to increase as cloud adoption continues to grow."

Copyright © 2022 IDG Communications, Inc.

22 cybersecurity myths organizations need to stop believing in 2022