Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Commando Cat campaign

Type
Campaign
Actors
😼Commando Cat
Pub. date
February 1, 2024
Initial access
Software misconfig
Impact
Resource hijacking
Observed techniques
Credential theftContainer enumerationIMDS abuseGlobal socket communicationCreate new local userCreate SSH backdoor
Observed tools
TinyShellXMRig
Targeted technologies
Docker
References
https://www.cadosecurity.com/the-nine-lives-of-commando-cat-analysing-a-novel-malware-campaign-targeting-docker/https://securitylabs.datadoghq.com/articles/analysis-of-teamtnt-doppelganger/https://www.trendmicro.com/en_us/research/24/f/commando-cat-a-novel-cryptojacking-attack-.html
Status
Finalized
Last edited
Jun 6, 2024 10:38 AM

This campaign, active since the beginning of 2024, deploys a benign container through the Commando project, escaping it to run multiple payloads on the Docker host. Docker is used as an initial access vector to deliver payloads that register persistence, create backdoors, exfiltrate cloud service provider credentials, and launch a cryptocurrency miner. The attacker gains a foothold by breaching vulnerable Docker instances, deploying a harmless container, and escaping it using the chroot command.

The campaign involves checks for specific services on compromised systems, such as sys-kernel-debugger, gsc, c3pool_miner, and dockercache, proceeding to the next stage only if these services are active. The purpose of checking for sys-kernel-debugger remains unclear. Further stages include dropping additional payloads from a command-and-control server, including a shell script backdoor capable of adding an SSH key, creating a rogue user named "games" with a known password, and modifying the /etc/sudoers file.

The attack employs techniques to avoid artifacts touching the disk, making forensics more challenging. The Commando Cat malware functions as a credential stealer, a stealthy backdoor, and a cryptocurrency miner, making it versatile for extracting maximum value from infected machines. While the exact origins of the threat actor are unclear, there are observed overlaps in shell scripts and the command-and-control IP address with cryptojacking groups like TeamTNT, suggesting a potential copycat group.

Made with 💙 by Wiz

Last Updated: April 3, 2025