![]() ![]() Once the malware is deployed, it will start mining for Monero crypto currency (like Bitcoin, but different). Because many endpoint protection software tools do not inspect activity inside containers, detection can be difficult.Īn attacker could gain an initial foothold by targeting unsecured Docker daemons (the service that runs Docker containers), and then installing a Docker image (downloaded through Command and Control (C2) servers) on the compromised host. It's a cryptojacking worm that spreads using containers in the Community Edition of the Docker Engine. ![]() Got questions? Get answers on LIVEcommunity!Ĭryptojacking worm activity overview provided by Unit 42. Reaper dives into what the cryptojacking worm called Graboid is and how it can impact your business. LIVEcommunity draws your attention to Unit 42's recent article, Graboid: First-Ever Cryptojacking Worm Found in Images on Docker Hub.
0 Comments
Leave a Reply. |