Cryptomining Malware Moves into Software Containers

Cryptomining Malware Moves into Software Containers

Security researchers at Palo Alto Networks have discovered the Graboid worm that spreads through Docker software containers and mines Monero cryptocurrency for the attackers. This is a new tactic and territory for crypto-mining worms. It is the first time such malware has been detected traversing software containers.

Once a core image repository is infected, anytime the image is pulled and used, the malware goes with it and is spawned to maliciously consume resources for crypto-mining. Traditional security software rarely looks inside containers, so these instances can be active for as long as the container is in use.

 Security recommendations:

  1. Make sure the docker engine is not exposed to the internet without proper authentication controls
  2. Use whitelisting where possible to identify and limit allowable incoming traffic sources
  3. Tenaciously protect the software repositories from tampering or infection
  4. Only pull images from trusted repositories
  5. Setup monitoring of images and repositories to detect if they have been modified or acting in unauthorized ways
Nathan Ramirez

Assistant Vice President Technical Engineer II

5 å¹´

Thank you for the information

赞
回复
Peter Rung

CyberSecurity - Open to new opportunities

5 å¹´

Nice list Matt! IMHO, let’s consider some old fashioned defensive programming added. Self monitoring software of changes to the containers could be added as #6! If valid data changes were made by the software, then the non-tampered checksum should adjust. If under monitoring logic or data changed in expectantly, then the software should terminate and not be allowed to restart without a deep inspection.

Evgeniy S.

Developing digital solutions for E-learning | AI/ML/DS @Aristek Systems Baltic

5 å¹´

Well....

赞
回复
Danny Rogers

Rapscallion and Cyber Security Researcher

5 å¹´

Seems like his advice is spot on best practice but perhaps a security tool to help monitor those changes would help also. Something like Twistlock or Aquasec would help.

Jon G Shende

AI-LLM Security CTO|Data|IAM |GCP, Azure,AWS |Machine Learning| IIoT Ernst & Young-Savvis-Juniper Networks Ericsson-Cognizant| Infragard

5 å¹´

Matthew Rosenquist?to the point, nice!

要查看或添加评论,请登录

Matthew Rosenquist的更多文章

社区洞察

其他会员也浏览了