Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Redis, Hadoop, and Docker exploitation

Redis, Hadoop, and Docker exploitation

Type
Campaign
Actors
❓Unknown
Pub. date
March 6, 2024
Initial access
Software misconfig1-day vulnerability
Impact
Resource hijacking
Observed techniques
Misconfigured Redis abuseMisconfigured Apache Hadoop abuseMisconfigured Docker abuse
Targeted technologies
Confluence ServerDockerRedisApache Hadoop
References
https://www.cadosecurity.com/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence/
Status
Finalized
Last edited
Jun 2, 2024 11:56 AM

Researchers observed threat actors exploiting misconfiguration in servers running Apache Hadoop YARN, Docker, Confluence, or Redis with new Golang-based malware, which uses worm-like behavior to automate host discovery and compromise. After gaining access to misconfigured servers, the threat actors deploy Monero for cryptocurrency mining.

The threat actors utilize novel worm-like malware written in Golang to spread to other machines by automating the process of finding and exploiting vulnerabilities and misconfigurations affecting publicly exposed servers. In particular, they leverage common misconfigurations affecting YARN, Docker and Redis, as well as a specific Confluence vulnerability (CVE-2022-26134) to gain remote control of the targeted system (RCE). Following initial access, the actors deploy Monero for cryptojacking purposes.

When compromising Docker servers, the threat actors spawn a container and escape from it onto the underlying host. The attackers also deploy the Platypus reverse shell utility to maintain access to the host, and deploy various shell scripts and user mode rootkits to hide malicious processes.

According to the researchers, the methods used in this activity resemble previous cloud threat activity by groups like TeamTNT and WatchDog.