Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Gafgyt Malware Targeting Misconfigured Docker Servers

Type
Campaign
Actors
🤖Gafgyt operator
Pub. date
December 3, 2024
Initial access
Software misconfig
Impact
Data exfiltrationDenial of service
Observed techniques
Misconfigured Docker abuse
Observed tools
Gafgyt botnet
Targeted technologies
Docker
References
https://www.trendmicro.com/en_us/research/24/l/gafgyt-malware-targeting-docker-remote-api-servers.html
Status
Finalized
Last edited
Dec 11, 2024 2:24 PM

Researchers identified threat actors leveraging misconfigured Docker Remote API servers to deploy the Gafgyt malware, traditionally targeting IoT devices, to perform DDoS attacks. Attackers exploit these misconfigurations to create Docker containers, elevate privileges, and execute malicious binaries, marking a shift in the malware’s targeting scope. They also employ shell scripts to deploy multiple malware variants across various architectures, all orchestrated via hardcoded command-and-control (C&C) servers.

Threat actors target misconfigured Docker Remote API servers by creating containers based on the “alpine” image and using techniques like chroot and Bind to mount the host filesystem, enabling privilege escalation and potential host takeover. Within these containers, they deploy the Gafgyt malware, including binaries like rbot and atlas.i586, which connect to hardcoded C&C servers to execute DDoS attacks using protocols such as UDP, TCP, ICMP, HTTP, and SYN. If the initial deployment fails, attackers utilize a fallback mechanism involving the execution of a shell script (cve.sh), which downloads and deploys malware variants across multiple architectures. These binaries also rely on the same C&C infrastructure to receive attack instructions and perform malicious actions.

Made with 💙 by Wiz

Last Updated: April 3, 2025