New Malware Targets Docker to Earn Crypto via Web3 Platform




Cybersecurity experts have uncovered a unique malware campaign designed to exploit Docker environments for cryptocurrency gains. Unlike traditional cryptojacking operations that use tools like XMRig to mine crypto directly, this campaign takes a more subtle approach.

The malware, analyzed by Darktrace and Cado Security, interacts with a decentralized Web3 platform called Teneo. This service rewards users with Teneo Points—convertible to $TENEO tokens—for running a Community Node that collects public social media data. These nodes extract content from platforms like Facebook, Reddit, TikTok, and X (formerly Twitter).

Investigators found the malware in a Docker container image named "kazutod/tene:ten", hosted on Docker Hub. Despite being uploaded only two months ago, the image had already seen over 300 downloads before it was taken down. Inside, it contained a highly obfuscated Python script that had to be unpacked through more than 60 decoding stages before executing its main function: connecting to the teneo[.]pro domain via WebSocket.

Interestingly, the script doesn’t actually scrape data. Instead, it sends frequent keep-alive signals—likely to maximize reward points on the platform, which are based on uptime and activity rather than output.


This method mirrors past tactics like the 9Hits Viewer malware, which abused misconfigured Docker setups to drive artificial web traffic. It also resembles proxyjacking—a scheme where attackers earn rewards by sharing victims' unused internet bandwidth.

With traditional cryptojacking tools like XMRig being easier to detect, attackers seem to be experimenting with stealthier, reward-based alternatives. Whether this new method proves more lucrative remains to be seen.

In related news, Fortinet researchers have spotted a botnet called RustoBot, spreading through vulnerabilities in TOTOLINK and DrayTek routers. This botnet appears to focus on launching DDoS attacks, particularly targeting technology firms in Japan, Taiwan, Vietnam, and Mexico.

As attackers increasingly exploit weakly secured network devices, experts emphasize the need for stronger endpoint protection and authentication to prevent such threats.

Reference:

https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html

Comments

Popular posts from this blog

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

CISA and ENISA enhance their Cooperation

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware