Security researchers have discovered a new cyber-threat targeting the Docker Engine API.
Attackers exploit misconfigurations to deploy a malicious Docker container with Python malware.
The malware acts as a DDoS bot agent, utilizing various attack methods for conducting DoS attacks.
The Docker Engine API is frequently exposed, leading to multiple campaigns scanning for vulnerabilities.
Attackers gain access to Docker's API through an HTTP POST request and retrieve a malicious Docker container from Dockerhub.
The malware's ELF executable reveals Python code compiled with Cython, focusing on various DoS methods.
The bot connects to a command-and-control server and carries out DDoS attacks using UDP- and SSL-based floods.
Although no mining activity has been observed, the malicious container contains files that facilitate such actions.
Users are urged to remain vigilant, perform assessments of pulled images, and implement network defenses.
Cado Security Labs has reported the malicious user to Docker, emphasizing the presence of malicious container images.
#PythonMalware #DDoSThreat #DockerAPI #Cybersecurity #Botnet #DoSAttacks #SecurityThreats
https://www.infosecurity-magazine.com/news/python-malware-ddos-threat-docker/