Pro-Ukraine hackers use Docker images to DDoS Russian sites

By Bill Toulas,     Bleeping Computer

Docker images with a download count of over 150,000 have been used to run distributed denial-of-service (DDoS) attacks against a dozen Russian and Belarusian websites managed by government, military, and news organizations.

Behind the incidents are believed to be pro-Ukrainian actors such as hacktivists, likely backed by the country's IT Army.

DDoS cyberattacks aim to cripple operations of by sending out more requests than the target can handle and becomes unavailable to legitimate clients.

Targeting Docker APIs

Among the 24 domains targeted include that of the Russian government, the Russian military, and Russian media like the TASS news agency.

Two Docker images involved in the attacks were spotted by threat researchers at cybersecurity company CrowdStrike, who observed them being deployed between February and March 2022.

Targeting exposed Docker APIs isn’t anything novel, as cryptocurrency mining gangs like Lemon_Duck and TeamTNT have been doing it for years.

Unfortunately, there’s a plethora of misconfigured or poorly secured Docker deployments out there, allowing threat actors to hijack the available resources for their purposes.

CrowdStrike noticed that its honeypots with exposed Docker Engine APIs were infected by two malicious images fetched straight from the Docker Hub repository.

The images are named “erikmnkl/stoppropaganda” and “abagayev/stop-russia”, and have been downloaded 50,000 times and 100,000 respectively. The numbers don’t necessarily reflect the volume of compromised hosts, which remains unclear at this time.

The targets for the DDoS attacks were picked randomly at first but later versions of the images came with a time-based selection and a hardcoded list of targets, which were hit in one-hour assaults.

Due to the type of the operation and the targeting scope, CrowdStrike suggests that this campaign is very likely backed by the Ukraine IT Army or similar hacktivists.

Deploying these DDoS attacks may attract retaliatory action from pro-Russia hackers, which could lead to lengthy and damaging service disruption.

To help admins detect the unwanted activity, CrowdStrike has provided the following Snort rule:



Comments

Popular posts from this blog

FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks

Nissan North America data breach impacts over 53,000 employees

Why Your VPN May Not Be As Secure As It Claims