Triaging a malicious Docker container
Blog post from Sysdig
Malicious Docker containers represent a new threat vector, exploiting exposed Docker APIs or vulnerable hosts for malicious activities such as data exfiltration or crypto-mining. The article details a case study by Sysdig researchers who simulated an exposed Docker API environment, capturing a malicious container for analysis. This container, masquerading as an Apache image, was found to contain a malware downloader disguised within a binary, targeting other Docker APIs for propagation. Static and dynamic analysis revealed attempts to download and execute the Monero miner, XMRig, indicating a compromise. The article emphasizes the importance of not exposing Docker endpoints, or otherwise implementing a zero-trust infrastructure to prevent unauthorized container execution, and highlights the value of having an incident response plan to quickly address and mitigate threats. Sysdig uses tools like Falco and its own platform to enhance Kubernetes security by providing pre-written security rules and facilitating better management of security risks in cloud environments.