Docker Zombie Malware Infects Containers for Crypto Mining and Self-Replication

A novel malware campaign targeting containerized infrastructures has emerged, exploiting insecurely exposed Docker APIs to spread malicious containers and mine Dero cryptocurrency.

Dubbed a “Docker zombie outbreak” by cybersecurity researchers at Kaspersky, this attack leverages a self-replicating propagation mechanism to transform compromised containers into “zombies” that mine cryptocurrency and infect new victims.

The campaign, detected during a recent compromise assessment, showcases an alarming degree of automation, requiring no command-and-control (C2) server as it spreads exponentially across vulnerable networks worldwide.

Zombie Malware
Infection chain

A New Threat in Containerized Environments

The attack begins when a threat actor exploits an exposed Docker API, typically over port 2375, to gain access to a containerized environment.

Once inside, two Golang-based, UPX-packed malware implants are deployed: a propagation malware masquerading as “nginx” (detected as Trojan.Linux.Agent.gen) and a Dero cryptocurrency miner named “cloud” (detected as RiskTool.Linux.Miner.gen).

The nginx malware is the orchestrator, ensuring persistence and propagation by logging activities in “/var/log/nginx.log” and maintaining a version marker in “/usr/bin/version.dat” to identify infected containers.

It relentlessly scans random IPv4 /16 subnets using the masscan tool to locate other vulnerable Docker APIs, creates new malicious containers with names of 12 random characters, and compromises existing Ubuntu 18.04-based containers on remote hosts.

Each new container is equipped with dependencies like masscan and docker.io, and the malware implants are copied over to sustain the infection cycle.

Zombie Malware
Malware operations log

Automated Infection Chain Unleashes Chaos

The cloud miner, derived from the open-source DeroHE CLI project, operates with hardcoded, encrypted configurations, including a wallet address (dero1qyy8xjrdjcn2dvr6pwe40jrl3evv9vam6tpx537vux60xxkx6hs7zqgde993y) and derod node addresses (d.windowsupdatesupport[.]link and h.wiNdowsupdatesupport[.]link), decrypted via AES-CTR during execution.

This miner hijacks the host’s resources for Dero mining while nginx ensures its continuous operation by restarting it if interrupted.

Unlike earlier campaigns targeting Kubernetes clusters with stealthy tactics, this attack prioritizes aggressive lateral movement, scanning and infecting new networks without hesitation.

Shodan data from April 2025 reveals 520 exposed Docker APIs globally, underscoring the vast potential for destruction posed by this threat.

The absence of a C2 server makes this campaign particularly insidious, as it operates autonomously, relying solely on the availability of insecure Docker APIs to propagate.

According to the Report, Kaspersky emphasizes the importance of robust monitoring and proactive threat hunting to combat such attacks, recommending tools like Kaspersky Container Security to detect misconfigurations and monitor registry images.

As containerized environments become increasingly prevalent, this Docker zombie malware serves as a stark reminder that runtime security is just as critical as building from trusted images.

Organizations must prioritize securing their Docker APIs and implementing comprehensive protection strategies to prevent falling victim to this self-replicating digital plague.

Indicators of Compromise (IoC)

Type Value
File Hash (nginx) 094085675570A18A9225399438471CC9
File Hash (cloud) 14E7FB298049A57222254EF0F47464A7
File Path /usr/bin/nginx, /usr/bin/cloud, /var/log/nginx.log, /usr/bin/version.dat
Derod Node Addresses d.windowsupdatesupport[.]link, h.wiNdowsupdatesupport[.]link
Dero Wallet Address dero1qyy8xjrdjcn2dvr6pwe40jrl3evv9vam6tpx537vux60xxkx6hs7zqgde993y

Related Articles

Back to top button