BSV
$53.48
Vol 20.32m
-0.12%
BTC
$95639
Vol 42175.35m
-1.82%
BCH
$449.41
Vol 329.89m
-1.62%
LTC
$101.73
Vol 798.72m
2.13%
DOGE
$0.31
Vol 4637.53m
-2.19%
Getting your Trinity Audio player ready...

Hackers have been exploiting the Dogecoin network to deploy a malware payload known as Doki, a new report has revealed. The report claims that the hackers have now been targeting their victims for six months but have managed to stay under the radar.

Doki is a new malware payload that the hackers have been deploying to attack Docker servers, the report by cybersecurity firm Intezer revealed. Unlike previous payloads targeting Docker servers, Doki uses the Dogecoin network to generate its C2 domain address.

Doki is an undetected backdoor for Linux systems, used to execute code by the hackers. It utilizes a unique domain generation algorithm based on Dogecoin, the report revealed. Being multi-threaded, it creates a separate thread upon execution, allowing it to handle all C2 communications.

The hackers are able to control which address the malware contacts by transferring a specific amount of Dogecoin from their digital currency wallet. By controlling the wallet, the hacker is able to switch the domain at will.

The use of the Dogecoin database has given Doki an edge over other malware payloads, the report claimed, stating, “Since the blockchain is both immutable and decentralized, this novel method can prove to be quite resilient to both infrastructure takedowns from law enforcement and domain filtering attempts from security products.”

Doki is deployed through the Ngrok botnet. This highly-effective botnet has been in operation for over two years now. It targets misconfigured Docker API ports and infects them in just a few hours.

Doki has been quite elusive, going for over six months undetected, the report states. This is despite having been uploaded to VirusTotal, a cyber-threat aggregation and analysis platform, on January 14 this year and being scanned multiple times since.

Intezer urged all companies owning container servers in the cloud to fix their configuration to prevent exposure.

Doki isn’t the first malware to exploit a blockchain. In September 2019, Trend Micro discovered that the Glupteba malware was using the BTC blockchain to keep itself alive. If a command and control (C&C) server was shut down, the hackers simply sent a BTC transaction with a new C&C server coded into the OP_RETURN field.

Recommended for you

Google unveils ‘Willow’; Bernstein downplays quantum threat to Bitcoin
Google claims that Willow can eliminate common errors associated with quantum computing, while Bernstein analysts noted that Willow’s 105 qubits...
December 18, 2024
WhatsOnChain adds support for 1Sat Ordinals with new API set
WhatsOnChain now supports the 1Sat Ordinals with a set of APIs in beta testing; with this new development, developers can...
December 13, 2024
Advertisement
Advertisement
Advertisement