'Commando Cat' Is Second Campaign of the Year Targeting Docker

‘Commando Cat’ Is Second Campaign of the Year Targeting Docker

Source Node: 2465634

In findings released by Cado researchers, they discovered a malware campaign, coined “Commando Cat,” which is targeting exposed Docker API endpoints. 

The cryptojacking campaign has only been active since the beginning of this year but it’s the second one targeting Docker. The first one used the 9hits traffic exchange application, according to the researchers. However, these Docker attacks aren’t necessarily rare, especially in cloud environments.

“This campaign demonstrates the continued determination attackers have to exploit the service and achieve a variety of objectives,” the researchers said. “Commando Cat is a cryptojacking campaign leveraging Docker as an initial access vector and (ab)using the service to mount the host’s filesystem, before running a series of interdependent payloads directly on the host.”

It is unclear who the threat actor behind Commando Cat is or where they’re from, though there is an overlap in scripts and IP addresses to other groups like Team TNT, indicating a potential connection or a copycat.

Because of the level of redundancy and the amount of evasion, the campaign is sophisticated in how it conceals itself. Acting as a credential stealer, backdoor, and cryptocurrency miner together as one, it makes for a highly stealthy and malicious threat.

Time Stamp:

More from Dark reading