LemonDuck crew deploy deceptive tactics to evade detection and anonymize mining operations. Credit: Tampatra / Bannosuke / Getty Images LemonDuck, a well-known cryptomining botnet, is targeting Docker on Linux systems to coin digital money, CloudStrike reported Thursday.The company’s threat research team revealed in a blog written by Manoj Ahuje that the botnet is leveraging Docker APIs exposed to the internet to run malicious containers on Linux systems.Docker is used to build, run, and mange containerized workloads. Since it runs primarily in the cloud, a misconfigured instance can expose a Docker API to the internet where it can be exploited by a threat actor, who can run a crypto miner inside an outlaw container.Docker containers a soft targetMike Parkin, an engineer at Vulcan Cyber, a provider of SaaS for enterprise cyber risk remediation, explains that one of the main ways attackers compromise containerized environments is through misconfigurations, which just shows how many organizations are failing to follow industry best practices. “There are tools available that can protect these environments from unauthorized use, and workload monitoring tools that can flag unusual activity,” he says in an interview. “The challenge can be coordinating between the development teams and the security teams, but there are risk management tools that can handle that as well.”Ratan Tipirneni, president and CEO of Tigera, a provider of security and observability for containers, Kubernetes, and cloud, adds that while Docker provides a high degree of programmability, flexibility, and automation it has an unintended side effect of increasing the attack surface. “This is especially true as container technologies get adopted more broadly by the mainstream market,” he says in an interview. “This creates a soft target for adversaries to compromise Docker, since it unlocks a lot of compute power for cryptomining.”How LemonDuck worksAfter running its malicious container on an exposed API, LemonDuck downloads an image file named core.png disguised as a bash script, Ahuje explains. Core.png acts as a pivot point for setting up a Linux cronjob, which can be used to schedule scripts or other commands to run automatically.The cronjob is then used to download a disguised file called a.asp, which is actually a bash file. If a system is using the Alibaba Cloud’s monitoring service— which can detect cloud instances for malicious activities if its agent is installed on a host or container—a.asp can disable it to avoid detection by a cloud provider.A.asp also downloads and runs XMRig as an xr file that mines the cryptocurrency. XMRig is deceptive because it uses a cryptomining proxy pool. “Proxy pools help in hiding the actual crypto wallet address where the contributions are made by current mining activity,” Ahuje writes.LemonDuck’s attack technique is a stealthy one. Rather than mass scanning the public IP ranges for exploitable attack surface, it tries to move laterally by searching for SSH keys. “This is one of the reasons this campaign was not as evident as other mining campaigns run by other groups,” Ahuje notes. Once SSH keys are found, he continues, the attacker uses those to log in to the servers and run their malicious scripts.Cloud attacks maturingIan Ahl, vice president of threat research and detection engineering at Permiso, a cloud security software company, observes that “While not uncommon, the disabling of cloud monitoring services such as Alibaba’s Cloud Defense by the malware shows an understanding of cloud environments.” “Targeting Docker services is niche, though not unexpected,” he says in an interview. “As cloud environments mature, so too do the attacks against them. LemonDuck is also particularly territorial. It disables competing malware if it’s found.”“Aside from the maturity and understanding of cloud environments, it is an otherwise unremarkable cryptocurrency miner,” he adds.CrowdStrike’s Ahuje explains that the cryptocurrency boom, combined with cloud and container adoption in enterprises, have been a monetarily attractive option for attackers. Since cloud and container ecosystems heavily use Linux, it’s attracted the attention of the operators of botnets like LemonDuck.“At CrowdStrike,” Ahuje writes, “we expect such kinds of campaigns by large botnet operators to increase as cloud adoption continues to grow.” Related content news Top cybersecurity product news of the week New product and service announcements from Coro, Descope, Genetec, Varonis, Cloudbrink, Databarracks, and Security Journey By CSO staff Dec 07, 2023 22 mins Generative AI Security news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Cyberattacks Vulnerabilities news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe