October 26, 2022 By Jonathan Reed 2 min read

A recent report reveals the well-known crypto mining botnet LemonDuck can target Docker to secretly mine cryptocurrency on the Linux platform. LemonDuck targets Microsoft Exchange servers to mine crypto, escalate privileges and move sideways in compromised networks.

It takes advantage of Docker, a mainstream platform used for building, running and managing containerized workloads. Since Docker runs container workloads in the cloud, a misconfigured cloud instance can expose a Docker API to the internet. Attackers can then exploit this API to run a hidden crypto miner inside an attacker-controlled container.

Crypto boom brings risk

The crypto boom has led to a notable rise in illicit mining. According to a Google Threat Horizon report, 86% of compromised Google Cloud instances were used to perform crypto mining. Using someone else’s device without their permission to do this is also referred to as cryptojacking.

The LemonDuck botnet targets Docker to mine crypto on Linux systems. LemonDuck also monetizes its efforts via multiple campaigns at the same time to mine crypto such as Monero.

Docker-related risk

As a container workload orchestrator, Docker provides APIs to help with automation. Docker APIs can be used with local Linux sockets or daemons (the default port is 2375).

The threat report explains that since Docker mostly runs container workloads in the cloud, a cloud instance vulnerability can expose Docker APIs. From there, an attacker can exploit the exposed API to cryptojack from an infected container. Attackers can also interfere with containers by abusing privileges, misconfigurations and vulnerabilities found in the container runtime.

How LemonDuck works

According to the report, LemonDuck runs infected containers on an exposed Docker API. It does so by using a custom Docker ENTRYPOINT to download a ‘core.png’ image file disguised as Bash script.

Researchers detected multiple campaigns running via the domain targeting Windows and Linux platforms at the same time. LemonDuck also implements a crypto mining proxy pool. Proxy pools obscure the actual crypto wallet address.

The threat report states that rather than scanning public IP ranges for at-risk attack surfaces, LemonDuck attempts to move sideways by searching for SSH keys. This method of avoiding detection sets LemonDuck apart from other malicious botnets. Once it finds SSH keys, the attacker uses the keys to log in to access servers and run scripts.

How to thwart cryptojacking

Given the massive cloud and container use in enterprises, cryptojacking has proven to be a financially lucrative option for threat actors. Since cloud and container ecosystems heavily use Linux, people who run botnets like LemonDuck now target Docker for mining crypto on the Linux platform.

Some organizations mitigate API-related attacks by adopting a zero trust security model to verify and authorize API connections to an app or software. This approach ensures the interaction meets a security policy’s requirements. A zero trust security strategy also authenticates and authorizes API connections based on dynamic policies and context from as many data sources as possible.

More from News

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

DHS: Guidance for AI in critical infrastructure

4 min read - At the end of 2024, we've reached a moment in artificial intelligence (AI) development where government involvement can help shape the trajectory of this extremely pervasive technology. In the most recent example, the Department of Homeland Security (DHS) has released what it calls a "first-of-its-kind" framework designed to ensure the safe and secure deployment of AI across critical infrastructure sectors. The framework could be the catalyst for what could become a comprehensive set of regulatory measures, as it brings into…

Apple Intelligence raises stakes in privacy and security

3 min read - Apple’s latest innovation, Apple Intelligence, is redefining what’s possible in consumer technology. Integrated into iOS 18.1, iPadOS 18.1 and macOS Sequoia 15.1, this milestone puts advanced artificial intelligence (AI) tools directly in the hands of millions. Beyond being a breakthrough for personal convenience, it represents an enormous economic opportunity. But the bold step into accessible AI comes with critical questions about security, privacy and the risks of real-time decision-making in users’ most private digital spaces. AI in every pocket Having…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today