4.7 C
Washington
Wednesday, April 23, 2025

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Must read

Cybersecurity researchers have detailed a malware marketing campaign that is concentrating on Docker environments with a beforehand undocumented approach to mine cryptocurrency.

The exercise cluster, per Darktrace and Cado Safety, represents a shift from different cryptojacking campaigns that immediately deploy miners like XMRig to illicitly revenue off the compute sources.

This includes deploying a malware pressure that connects to a nascent Web3 service referred to as Teneo, a decentralized bodily infrastructure community (DePIN) that enables customers to monetize public social media information by working a Neighborhood Node in change for rewards referred to as Teneo Factors, which will be transformed into $TENEO Tokens.

The node primarily capabilities as a distributed social media scraper to extract posts from Fb, X, Reddit, and TikTok.

An evaluation of artifacts gathered from its honeypots has revealed that the assault begins with a request to launch a container picture “kazutod/tene:ten” from the Docker Hub registry. The picture was uploaded two months in the past and has been downloaded 325 occasions thus far.

The container picture is designed to run an embedded Python script that is closely obfuscated and requires 63 iterations to unpack the precise code, which units up a connection to teneo[.]professional.

“The malware script merely connects to the WebSocket and sends keep-alive pings with the intention to achieve extra factors from Teneo and doesn’t do any precise scraping,” Darktrace stated in a report shared with The Hacker Information. “Based mostly on the web site, a lot of the rewards are gated behind the variety of heartbeats carried out, which is probably going why this works.”

The marketing campaign is harking back to one other malicious risk exercise cluster that is recognized to contaminate misconfigured Docker cases with the 9Hits Viewer software program with the intention to generate visitors to sure websites in change for acquiring credit.

See also  Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access

The intrusion set can be much like different bandwidth-sharing schemes like proxyjacking that contain downloading a selected software program to share unused web sources for some form of monetary incentive.

“Usually, conventional cryptojacking assaults depend on utilizing XMRig to immediately mine cryptocurrency, nevertheless as XMRig is extremely detected, attackers are shifting to various strategies of producing crypto,” Darktrace stated. “Whether or not that is extra worthwhile stays to be seen.”

The disclosure comes as Fortinet FortiGuard Labs revealed a brand new botnet dubbed RustoBot that is propagating by safety flaws in TOTOLINK (CVE-2022-26210 and CVE-2022-26187) and DrayTek (CVE-2024-12987) gadgets with an goal to conduct DDoS assaults. The exploitation efforts have been discovered to primarily goal the expertise sector in Japan, Taiwan, Vietnam, and Mexico.

“IoT and community gadgets are sometimes poorly defended endpoints, making them engaging targets for attackers to take advantage of and ship malicious applications,” safety researcher Vincent Li stated. “Strengthening endpoint monitoring and authentication can considerably cut back the chance of exploitation and assist mitigate malware campaigns.”

Related News

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News