New Malware Exploits Exposed Docker APIs to Gain Persistent Root SSH Access

Cybersecurity

The Akamai Hunt Team has identified a new malware strain targeting exposed Docker APIs, showing expanded infection capabilities.

Overview

Initially detected in August 2025, this variant blocks other attackers from accessing the Docker API and delivers a modular payload instead of a cryptominer. The findings highlight the rapid evolution of threat actors, from hijacking Docker hosts to potentially establishing a botnet framework.

Initial Threat Vector

In June 2025, malware was reported exploiting unsecured Docker APIs on port 2375, using Tor-based downloads to deploy cryptocurrency miners. The initial campaign aimed to hijack compute cycles for cryptomining under Tor anonymity.

Akamai’s Variant: Expanded Capabilities

Persistent SSH Root Access and API Lockdown

Akamai observed HTTP requests to Docker APIs attempting container creation. The payload installed Tor, retrieved a docker-init.sh script, and executed it on the host. Key distinctions include:

The Go dropper identifies logged-in users, and the secondary binary:

Detection and Mitigation

Detection techniques for this malware include:

To reduce exposure and risk:

This new Docker-API malware variant underscores the speed at which adversaries adapt known exploits. By combining SSH root backdoors, API lockdown tactics, and modular payloads, the threat actor has elevated a simple cryptominer campaign into a multi-stage intrusion framework. Continuous threat hunting is essential for early detection and remediation.

Exit mobile version