EN

Kaspersky uncovers Dero crypto miner spreading via exposed container environments

 

Kaspersky Security Services experts have identified a sophisticated cyberattack campaign targeting containerized environments to deploy a miner for the Dero cryptocurrency. The attackers abuse exposed Docker APIs — parts of Docker, an open-source container development platform.

In 2025, there are nearly 500 insecurely published Docker API default ports worldwide on average each month. In this campaign, cybercriminals inject two types of malware:

  • The miner itself
  • A propagation malware that spreads the campaign to other vulnerable container networks

Campaign Discovery and Impact

Kaspersky discovered the campaign during a compromise assessment project. Organizations using containerized infrastructure with unprotected Docker APIs are at risk — including:

  • Tech companies
  • Software developers
  • Hosting & cloud service providers

According to Shodan, there are 485 exposed Docker API ports/month, creating a large attack surface.


Attack Methodology

Once an exposed API is found, attackers either:

  • Compromise existing containers, or
  • Deploy new malicious containers based on standard Ubuntu images

Two malwares are injected:

  • “cloud”: a Dero miner
  • “nginx”: maintains persistence, ensures execution, and scans for other exposed environments

These operate without C2 servers, making each infected container an independent threat scanner.


Expert Insight

“Each compromised container can launch new attacks. Without urgent protection, infections could grow exponentially,”
explains Amged Wageh, Incident Response & Compromise Assessment expert at Kaspersky.

“Containers are core to development and scalability. Their widespread use across cloud-native, DevOps, and microservices makes them attractive to attackers. A 360-degree security approach is now a must.”


Masquerading Technique

The malware names “nginx” and “cloud” are embedded in binaries — a common tactic to pose as legitimate tools and evade detection.


Kaspersky Recommendations

  • Do not expose Docker APIs unless operationally necessary
  • Use TLS to secure exposed APIs
  • Conduct Compromise Assessments regularly
  • Use Kaspersky Container Security to protect the full container lifecycle
  • Adopt Managed Security Services like:
    • Compromise Assessment
    • Managed Detection & Response (MDR)
    • Incident Response

Detection & Technical Analysis

Kaspersky detects the malware as:

  • Trojan.Linux.Agent.gen
  • RiskTool.Linux.Miner.gen

Full technical report: Securelist

زر الذهاب إلى الأعلى