overview

Threat researchers with Trend Micro have recently uncovered attacks leveraging exposed instances of Docker Remote API.  

After discovering public facing Docker API hosts, the attackers will attempt to evade detection and other security solutions before deploying a crypto-mining solution, hijacking the victims network resources.  

 

how avertium is protecting our customers

 

IOCs ADDED TO OUR THREAT FEEDS

NOTE!: Avertium is actively searching across all monitored environments for the IoC’s listed below. If any are discovered, we will reach out to you directly. If your environment or portions of your environment are not currently being monitored, please reach out to your Service Delivery Manager. 

 

http://104.183.100.189/common/backup.list 

Url 

e16fb2a22fce5241565784b5a8518ed2becc9948d4c398093edbb70a946f9331 

StixFile 

dfa0024b534410f9121d5842526ca47c086b0ea1 

StixFile 

da006a0b9b51d56fa3f9690cf204b99f 

StixFile 

cf265a3a3dd068d0aa0c70248cd6325d 

StixFile 

ca3f246d635bfa560f6c839111be554a14735513e90b3e6784bedfe1930bdfd6 

StixFile 

ba120e9c7f8896d9148ad37f02b0e3cb 

StixFile 

a6d3c6b6359ae660d855f978057aab1115b418ed277bb9047cd488f9c7850747 

StixFile 

9813cde2db1f31f92fed49a4dd8aa29b21d72581 

StixFile 

835a9a6908409a67e51bce69f80dd58a 

StixFile 

78.47.18.110 

IPv4-Addr 

6e7230dbe35df5b46dcd08975a0cc87f 

StixFile 

656e22c65bf7c04d87b5afbe52b8d800 

StixFile 

4d3a4f916aeb9234c3de1423330fa8b0ec3e2518 

StixFile 

46.101.139.173 

IPv4-Addr 

44ca5b263a955ba19ec4f57a5646d4a406a34f70 

StixFile 

3de0a2f76f95375c1c078a465683415bda99f01b 

StixFile 

3b78dbcac10c3c3bcb38a9aa077b8f62bdea5f2d 

StixFile 

31ee4c9984f3c21a8144ce88980254722fd16a0724afb16408e1b6940fd599da 

StixFile 

22e4a57ac560ebe1eff8957906589f4dd5934ee555ebcc0f7ba613b07fad2c13 

StixFile 

211.234.111.116 

IPv4-Addr 

194.169.175.107 

IPv4-Addr 

169.155.242.252 

IPv4-Addr 

104.183.100.189 

IPv4-Addr 

0fd199053171fec86be186106eac717c4edae2ad 

StixFile 

9fb8a70406d0c44a98ce8db9240661a85e0f3f09a6db4c3e0d6affb91c11d4b0 

StixFile 

 

TTPs TO MONITOR

1. T1190: Exploit Public-Facing Application 

Attackers exploit weaknesses in internet-facing applications to gain unauthorized access or control. 

2. T1059: Command and Scripting Interpreter 

Adversaries use command-line interfaces or scripts to execute malicious commands or scripts. 

3. T1078: Valid Accounts 

Attackers use valid user credentials to maintain access or execute attacks within a system. 

4. T1036: Masquerading 

Techniques that disguise malicious processes or files to look legitimate. 

5. T1105: Ingress Tool Transfer 

Attackers download or transfer tools or malware onto a compromised system for further exploitation. 

 

 

additional recommendations

  • Ensure any instances of Docker Remote Access API’s are secure with strong access controls 
  • Monitor your Docker Remote API servers for unusual activity or unauthorized access 
  • Implement a patching program to keep any instances of Docker Remote Access API up-to-date  

 

 

ADDITIONAL SERVICE OFFERINGS

  • Fusion MXDR  is the first MDR offering that fuse together all aspects of security operations into a living, breathing, threat-resistant XDR solution. By fusing insights from threat intelligence, security assessments, and vulnerability management into our MDR approach, Fusion MXDR offers a more informed, robust, and cost-effective approach to cybersecurity – one that is greater than the sum of its parts.
  • Security Information and Event Management (SIEM) - Minimizing the impact of a successful ransomware or malware attack requires detecting it as early in the attack as possible. A Security Information and Event Management (SIEM) system can help an organization to accomplish this. Avertium offers a comprehensive SIEM-based approach that increases the potential for detecting a ransomware infection before it deploys. SIEM provides a holistic overview of a company’s IT environment from a single point of view in terms of its specific security events, empowering teams to detect and analyze unusual behavior. 
  • Avertium aligns your Cybersecurity Strategy with your business strategy, ensuring that your investment in security is also an investment in your business. Our Cybersecurity Strategy service includes:  
    • Strategic Security Assessments - Strengthening your security posture begins with knowing where your current program stands (NIST CSF, Security Architecture, Business Impact Analysis, Sensitive Data Inventory, Network Virtualization and Cloud Assessment). 
    • Threat Mapping – Leverage Avertium’s Cyber Threat Intelligence, getting a more informed view of your most likely attack scenarios (Threat Assessment and MITRE ATT&CK). 
    • Cyber Maturity Roadmap - Embrace a comprehensive, quantifiable, and well-organized approach to establishing and continuously enhancing your cybersecurity resilience (Policy + Procedure Development, Virtual CISO (VCISO), Training + Enablement, Tabletop Exercises, and Business Continuity + Disaster Recovery Plan).




 

SUPPORTING DOCUMENTATION

Attackers Target Exposed Docker Remote API Servers With perfctl Malware 

Cybercriminals Exploiting Docker API Servers for SRBMiner Crypto Mining Attacks 

 

Chat With One of Our Experts




Flash Notice API Security API Vulnerabilities Trend Micro Blog