Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How a headphone site operator built loyalty startup Lantern to solve his own problems

    October 16, 2025

    North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

    October 16, 2025

    Rent a Cyber Friend will pay you to talk to strangers online and will show off its platform at TechCrunch Disrupt 2025

    October 16, 2025
    Facebook X (Twitter) Instagram
    Trending
    • How a headphone site operator built loyalty startup Lantern to solve his own problems
    • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
    • Rent a Cyber Friend will pay you to talk to strangers online and will show off its platform at TechCrunch Disrupt 2025
    • One Republican Now Controls a Huge Chunk of US Election Infrastructure
    • Deel hits $17.3B valuation after raising $300M from big-name VCs
    • Everything Apple launched on Oct. 15: M5 chipset, MacBook Pro, iPad, Vision Pro, more
    • Final 2 days to claim your exhibit table at Disrupt 2025
    • How to Assess and Choose the Right AI-SOC Platform
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Docker malware breaks in through exposed APIs, then changes the locks
    Security

    Docker malware breaks in through exposed APIs, then changes the locks

    TechurzBy TechurzSeptember 11, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Malware
    Share
    Facebook Twitter LinkedIn Pinterest Email


    “Analysis of the script (used in the strain) indicates that it performs multiple persistence and defense evasion steps, including denying future access to the exposed instance, which is something we’ve not seen in previous variants,” Gilvarg said.

    Common practices that may leave Docker APIs exposed to public access include running the Docker API without transport layer security (TLS) for convenience, binding to 0.0.0.0 instead of localhost, cloud deployments with weak firewall rules, and using third-party orchestration or monitoring tools that require constant Docker API access.

    The variant has creative twists

    Setting the variant apart is its move to deny others access to the same Docker API, effectively monopolizing the attack surface. It tries to modify firewall settings (iptables, nft, firewall-cmd, etc.) via a cron job to drop or reject incoming connections to port 2375. A cron job is a scheduled task on Linux systems that runs automatically at specified times or intervals.

    “The ‘crontab’ file is on the host itself, as the attacker mounted it when they created the container,” Gitvarg added. “This is a new section in the code that we haven’t seen in previous variants, which is currently not detected in VirusTotal.” Additionally, the malware includes logic (even if not yet fully active) to scan for and potentially exploit other services, e.g., Telnet (port 23) and Chrome’s remote debugging port (9222). These could allow credential theft, data exfiltration, or remote browser session hijacking. Akamai warns that while these capabilities aren’t fully leveraged yet, their presence suggests the malware may evolve into a more complex botnet.

    APIs Breaks Docker Exposed locks malware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCharlie Kirk Was Shot and Killed in a Post-Content Moderation World
    Next Article We can’t “make American children healthy again” without tackling the gun crisis
    Techurz
    • Website

    Related Posts

    Security

    North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

    October 16, 2025
    Security

    One Republican Now Controls a Huge Chunk of US Election Infrastructure

    October 16, 2025
    Security

    Everything Apple launched on Oct. 15: M5 chipset, MacBook Pro, iPad, Vision Pro, more

    October 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    How a headphone site operator built loyalty startup Lantern to solve his own problems

    October 16, 2025

    North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

    October 16, 2025

    Rent a Cyber Friend will pay you to talk to strangers online and will show off its platform at TechCrunch Disrupt 2025

    October 16, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.