'Commando Cat' Cryptojacking Campaign Targets Exposed Docker APIs
Commando Cat, a sophisticated cryptojacking campaign, is attacking exposed Docker API endpoints on the internet.
The Commando Cat campaign, targeting exposed Docker API endpoints, deploys a series of sophisticated shell scripts to facilitate a cryptojacking attack, as detailed by researchers Nate Bill and Matt Muir from Cado Security.
The campaign's complexity includes multiple stages, beginning with a command that pulls payloads directly from the attacker's command-and-control (C2) infrastructure using tools like curl or wget. These payloads are then executed through the bash command shell. Matt Muir from The Hacker News highlights this tactic, noting its efficiency in payload delivery.
Included in these payloads are three distinct shell scripts – tshd.sh, gsc.sh, and aws.sh. These scripts serve various purposes:
- tshd.sh: A script for deploying Tiny SHell, a minimalist Unix shell.
- gsc.sh: Used to install an improvised version of netcat, known as gs-netcat.
- aws.sh: Aimed at exfiltrating credentials.
Interestingly, the gsc.sh script uses /dev/shm instead of the more common /tmp directory. This choice, likely an evasion tactic, ensures that the artifacts remain memory-based and don’t touch the disk, complicating forensic analysis. This approach is reminiscent of tactics used in the high-profile BPFdoor Linux campaign.
The final stage of the attack involves the deployment of a Base64-encoded script directly, rather than fetching it from the C2 server. This script then installs the XMRig cryptocurrency miner, ensuring to first terminate any competing mining processes on the infected system.
The origins of the threat actors behind Commando Cat remain uncertain. However, similarities in the shell scripts and the C2 IP address suggest possible connections to known cryptojacking groups like TeamTNT, indicating that Commando Cat might be a copycat group or an evolution of these earlier groups.
Summarizing their findings, the Cado Security researchers describe Commando Cat as a multi-functional malware, serving as a credential stealer, a stealthy backdoor, and a cryptocurrency miner. This combination makes it a particularly versatile threat capable of extracting maximum value from compromised systems.