BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Wormable Malware Turns Misconfigured Docker APIs into Dero Miners

Self-Spreading Malware Targets Docker Containers to Mine Dero Cryptocurrency

  • A new Malware campaign targets misconfigured Docker API instances and turns them into a cryptocurrency mining botnet.
  • The malware spreads by scanning the internet for exposed Docker APIs and uses compromised instances to mine Dero coins.
  • The attack uses two Golang-based components: one for spreading itself called “nginx,” and another for mining Dero cryptocurrency.
  • The malware disguises itself using legitimate-sounding names and infects both new and existing Docker containers, focusing on Ubuntu-based systems.
  • A separate Monero mining campaign also uses a new backdoor built on the PyBitmessage protocol for command and control purposes.

A recent malware campaign has begun exploiting unsecured Docker API endpoints, converting affected containers into a botnet for Dero cryptocurrency mining. The self-spreading malware scans the internet for vulnerable Docker instances, enabling it to quickly grow its number of infected hosts.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

Security researchers from Kaspersky discovered that an unidentified attacker gains access through public Docker APIs and deploys malicious software to create a network of mining bots. According to the report, the campaign uses worm-like behavior, allowing compromised machines to scan for additional targets and spread the malware further.

Two main components drive the attack. The first, called “nginx,” scans for exposed Docker APIs and deploys a miner payload named “cloud.” Both programs are written in Golang. The “nginx” tool imitates the well-known nginx web server to avoid detection. As security researcher Amged Wageh explained, “This led to the running containers being compromised and new ones being created not only to hijack the victim’s resources for cryptocurrency mining but also to launch external attacks to propagate to other networks.”

The spreading malware generates random IP addresses, checks if Docker’s remote control service (dockerd) is accessible, and, if so, deploys malicious containers with random names. It installs necessary programs like “masscan” for network scanning and “docker.io” for Docker operations, allowing it to keep searching for more targets. The “nginx” binary is added to the shell configuration for persistence, ensuring it starts every time a shell session opens. “Then nginx prepares the new container to install dependencies later by updating the packages via ‘docker -H exec apt-get -yq update,'” Wageh said.

Kaspersky linked the infrastructure and tactics to earlier Dero mining operations found by CrowdStrike and Wiz in 2023 and 2024, respectively. The campaign uses the open-source DeroHE CLI miner to carry out its mining operations. The mining activity is not controlled by a central server, making it harder to track or disrupt. Any organization running a containerized environment with an insecurely exposed Docker API is at risk.

- Advertisement -

In a related development, the AhnLab Security Intelligence Center (ASEC) reported another campaign that delivers a Monero mining tool and a new backdoor using the PyBitmessage protocol. This protocol enables peer-to-peer encrypted communication and hides command messages within seemingly ordinary network traffic. The backdoor allows attackers to send instructions that are executed as PowerShell scripts.

ASEC warned that the exact distribution method is uncertain but may involve disguised cracked software. They advise users to avoid downloading applications from untrusted sources and use official channels only. The team stated, “Threat actors exploited the PyBitmessage module, which implements this protocol in the Python environment, to exchange encrypted packets in a format similar to regular web traffic. In particular, C2 commands and control messages are hidden within messages from real users in the Bitmessage network.”

These incidents highlight ongoing threats to containerized and cloud-based environments, emphasizing the need to secure Docker APIs and avoid risky downloads.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Crypto trader’s $50M swap blunder wasn’t laundering: experts

A crypto trader lost $50 million last week by swapping it for just $37,000...

DarkSword iOS Exploit Targets Crypto Wallets

Google researchers identified an iOS exploit chain dubbed DarkSword targeting iPhones running iOS 18.4...

Azza Miner Simplifies Bitcoin Mining for Everyone

Azza Miner simplifies Bitcoin mining by removing the need to own or manage physical...

Quantum Bitcoin Risk Real, But Fixes In Progress: Galaxy

The quantum risk to Bitcoin private keys is real, but most wallets are not...

Apple Urges iPhone Users Update iOS on Coruna, DarkSword Threats

Apple is urging users of outdated iOS versions to update their iPhones immediately to...

Must Read

Top 10 Best Blockchain Games

If you want to know about the best blockchain games then read this article carefully. We listed the best games you can play and...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading