Botnet abuses Docker servers & crypto blockchain to deliver Doki backdoor

Botnet abuses Docker servers & crypto blockchain to deliver Doki backdoor

As user organizations move more of their business infrastructure off premises, cybercriminals become increasingly motivated to target Linux-based cloud environments, including Docker servers with misconfigured API ports.


And while cryptojacking schemes comprise some of the more conventional varieties of these Linux-based malware attacks, researchers have just disclosed the discovery of a Docker container attack that distributes a “fully undetectable” malicious backdoor that abuses the Dogecoin cryptocurrency blockchain for dynamic C2 domain generation.


Dubbed Doki, the backdoor is designed to execute malicious code sent by adversaries, and has secretly been in existence for more than six months already, according to researchers from Intezer, who described their findings in a blog post today.


Doki establishes C2 communication by querying the “dogechain.info API, a cryptocurrency block explorer for Dogecoin, for the value that was sent out (spent) from a hardcoded wallet address that is controlled by the attacker.” That value is then hashed and converted to a subdomain that is appended to ddns.net in order to create a random C2 address.


“Using ..

Support the originator by clicking the read the rest link below.