{"id":3463,"date":"2020-12-07T08:04:11","date_gmt":"2020-12-07T07:04:11","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3463"},"modified":"2023-08-16T13:31:29","modified_gmt":"2023-08-16T11:31:29","slug":"xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/","title":{"rendered":"Xanthe malware spreads using systems with exposed Docker API [Warning]"},"content":{"rendered":"\n<p>Welcome to the next episode of <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Security Center<\/a>. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered a campaign affecting Linux systems employing a multi-modular botnet that uses various methods to spread across the network. How does it infect vulnerable infrastructures exactly? Check below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"xanthe-malware-targets-misconfigured-docker-servers\"><strong>Xanthe malware targets misconfigured Docker servers<\/strong><\/h2>\n\n\n<p>Xanthe is a Monero cryptomining botnet, which has been exploiting incorrectly configured Docker API installations in order to infect Linux systems.<\/p>\n\n\n\n<p>Typically crypto miners attack Windows desktop systems \u2013 because the number of possible infection is much larger. But with the growth of cloud environments, there are more and more hosts on the internet that run Linux and that are not as well secured as in-house Windows systems. Non-Windows systems become then quite attractive targets for malicious actors.<\/p>\n\n\n\n<p>Xanthe, named after the file title of the main spreading script, uses an initial downloader script (pop.sh) to download and run its main bot module (xanthe.sh). This module then downloads and runs four additional modules with various anti-detection and persistence functionalities. These additional four modules include:&nbsp;<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\">A process-hiding module (libprocesshider.so).<br>A shell script to disable other miners and security services (xesa.txt).<br>A shell script to remove Docker containers of competing Docker-targeting cryptomining trojans (fczyo).<br>And the XMRig binary (as well as a JSON configuration file, config.json).<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Xanthe attack process<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/12\/image10.jpg\" alt=\"\" class=\"wp-image-3476\" width=\"640\" height=\"381\"\/><figcaption>Image: <a href=\"https:\/\/blog.talosintelligence.com\/2020\/12\/xanthe-docker-aware-miner.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco Talos<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>Once downloaded, the main module is also responsible for spreading to other systems on local and remote networks. It attempts to spread to other known hosts by stealing client-side certificates and connecting to them without the requirement for a password.<\/p>\n\n\n\n<p>Misconfigured Docker servers are another way that Xanthe spreads. Researchers said that Docker installations can be easily misconfigured and the Docker daemon exposed to external networks with a minimal level of security.<\/p>\n\n\n\n<p>Recent checking of Shodan shows that there are more than 6,000 incorrectly-configured Docker implementations exposed to the internet. As seen in the case of Xanthe, attackers are actively finding ways to exploit those exposed servers.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/misconfigured-docker-servers-xanthe-malware\/161732\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"trickbots-new-module-aims-to-infect-your-uefi-firmware\"><strong>TrickBot&#8217;s new module aims to infect your UEFI firmware<\/strong><\/h2>\n\n\n<p>The developers of TrickBot have created a new module that probes for UEFI vulnerabilities. Which means that attackers are looking for a way to take ultimate control over infected machines. No wonder that this new TrickBot feature scares security professionals.<\/p>\n\n\n\n<p>With access to UEFI firmware, a threat actor would establish on the compromised machine persistence that resists operating system reinstalls or replacing of storage drives. Malicious code planted in the firmware (bootkits) is invisible to security solutions operating on top of the operating system because it loads before everything else, in the initial stage of a computer\u2019s booting sequence.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"targeting-intel-platforms\">Targeting Intel platforms<\/h5>\n\n\n<p>TrickBoot is a reconnaissance tool that checks for vulnerabilities in the UEFI firmware of the infected machine. It checks if the UEFI\/BIOS write protection is active using the RwDrv.sys driver from RWEverything, a free utility that allows access to hardware components such as the SPI flash memory chip that stores a system\u2019s BIOS\/UEFI firmware. The threat actor had implemented a mechanism that checked the single-chip chipset on the compromised system.<\/p>\n\n\n\n<p>The researchers discovered that the role of the module was to run PCH queries to determine the specific model of PCH running on the system, thus identifying the platform. This information also allows the attacker to check if the platform is vulnerable or not.<\/p>\n\n\n\n<p>The researchers also found that the actor relies on functions from a known firmware exploitation tool and library called fwexpl for the following purposes:<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\">Read data from hardware IO ports.<br>Call the <em>rwdrv.sys<\/em> driver to write data to hardware IO ports.<br>Call the <em>rwdrv.sys<\/em> driver to read data from physical memory addresses.<br>Call the <em>rwdrv.sys<\/em> driver to write data to physical memory addresses.<\/p>\n\n\n\n<p>TrickBot developing such a module is a clear indication that the actor is making an effort to expand its grip on compromised systems. The botnet already has thousands of infected machines from which the actor can select the most valuable targets.<\/p>\n\n\n\n<p>For now the verification targets only Intel platforms (Skylake, Kaby Lake, Coffee Lake, Comet Lake).<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trickbots-new-module-aims-to-infect-your-uefi-firmware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"turla-crutch-keeping-the-back-door-open\"><strong>Turla Crutch: Keeping the \u201cback door\u201d open<\/strong><\/h2>\n\n\n<p>ESET researchers found a previously undocumented backdoor and document stealer believed to be attributed to Turla APT group. Dubbed Crutch, it was used from 2015 to, at least, early 2020. They have seen Crutch on the network of a Ministry of Foreign Affairs in a country of the European Union, suggesting that this malware family is only used against very specific targets as is common for many Turla tools.<\/p>\n\n\n\n<p>Specialists identified similarities between Crutch and Turla\u2019s previous backdoor &#8211; Gazer, also known as WhiteBear. Both samples have similar droppers and were dropped at C:\\Intel~intel_upd.exe on the same machine with a five-day interval in September 2017. Aforementioned samples drop CAB files containing the various malware components. The loaders share clearly related PDB paths and decrypt their payloads using the same RC4 key.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"data-exfiltration\">Data exfiltration<\/h5>\n\n\n<p>According to ESET, Turla used the Crutch toolset against several machines of the Ministry of Foreign Affairs in a country of the European Union. These tools were designed to exfiltrate sensitive documents and other files to Dropbox accounts Turla operators controlled. The main malicious activity is the staging, compression and exfiltration of documents and various files. Commands are manually executed by the operators. The exfiltration is performed by another backdoor command.<\/p>\n\n\n\n<p>ESET specialists believe that Crutch is not a first-stage backdoor and is deployed after the operators have first compromised an organization\u2019s network. The first method consists in using a first-stage implant such as Skipper. The second method is the use of PowerShell Empire. It\u2019s not obvious how the malicious script arrived on the machine but probably through another implant although a phishing document cannot be excluded. It should be noted that the PowerShell Empire scripts were using OneDrive and Dropbox.<\/p>\n\n\n\n<p>Crutch is able to bypass some security layers by abusing legitimate infrastructure \u2013 here Dropbox \u2013 in order to blend into normal network traffic while exfiltrating stolen documents and receiving commands from its operators.<\/p>\n\n\n\n<p>The new version of Clutch has following components: The Crutch DLL (outllib.dll), the genuine Outlook Item Finder from Microsoft Outlook, genuine DLL that is a dependency of finder.exe, Crutch config file that contains the Dropbox API token, the genuine RAR utility and a clean version of the Wget utility for Windows.<\/p>\n\n\n\n<p>Crutch shows that the Turla is not short of new or currently undocumented backdoors. This discovery further strengthens the perception that the group has considerable resources to operate such a large and diverse arsenal.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/2020\/12\/02\/turla-crutch-keeping-back-door-open\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hundreds-of-millions-of-android-users-potentially-exposed-8-of-apps-vulnerable-to-old-bug\"><strong>Hundreds of millions of Android users potentially exposed &#8211; 8% of apps vulnerable to old bug<\/strong><\/h2>\n\n\n<p>Hundreds of millions of Android users are potentially exposed to the risk of hack due to the use of Android Play Core Library versions vulnerable to CVE-2020-8913. Some of the apps include Microsoft&#8217;s Edge browser, Grindr, OKCupid, and Cisco Teams &#8211; all together, 8% of all available Google Play apps!&nbsp;<\/p>\n\n\n\n<p>The security flaw resides in older versions of Play Core, a very popular Java library provided by Google that developers can embed inside their apps to interact with the official Play Store portal.<\/p>\n\n\n\n<p>Earlier this year, security researchers from Oversecured discovered a major vulnerability (CVE-2020-8913) in the Play Core library that a malicious app installed on a user&#8217;s device could have abused to inject rogue code inside other apps and steal sensitive data \u2014 such as passwords, photos, 2FA codes, and more.<\/p>\n\n\n\n<p>A demo of such an attack is available below:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Account Takeover exploiting vulnerability in Android&#039;s Play Core Library Code - Demo\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/Dfa8JEvnteY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Google patched the bug in Play Core 1.7.2 in March. According to a scan performed by Check Point, six months after a Play Core patch was made available, 13% of all the Play Store apps were still using this library, and only 5% were using an updated (safe) version.<\/p>\n\n\n\n<p>Apps that did their duty to users and updated the library included Facebook, Instagram, Snapchat, WhatsApp, and Chrome. However, many other apps did not.<\/p>\n\n\n\n<p>Among the apps with the largest userbases that failed to update, Check Point listed Microsoft Edge, Grindr, OKCupid, Cisco Teams, Viber, and Booking.com. After researchers notified the apps &#8211; 3 months later only Booking and Viber have made patches.&nbsp;<\/p>\n\n\n\n<p>The vulnerability is extremely easy to exploit. All the hacker needs to do is to create a 'hello world&#8217; application that calls the exported intent in the vulnerable app to push a file into the verified files folder with the file-traversal path. Then sit back and watch the magic happen.<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/111911\/mobile-2\/android-cve-2020-8913-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Google Hacker Details Zero-Click 'Wormable&#8217; Wi-Fi Exploit to Hack iPhones (<a href=\"https:\/\/thehackernews.com\/2020\/12\/google-hacker-details-zero-click.html\" target=\"_blank\" rel=\"noreferrer noopener\">The Hacker News<\/a>)<br>2. Researchers Discover New Obfuscation-As-a-Service Platform (<a href=\"https:\/\/www.darkreading.com\/cloud\/researchers-discover-new-obfuscation-as-a-service-platform\/d\/d-id\/1339609\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a>)<br>3. Mac users warned of more Ocean Lotus malware targeted attacks (<a href=\"https:\/\/grahamcluley.com\/mac-users-warned-of-more-ocean-lotus-malware-targeted-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Graham Cluley<\/a>)<strong><br><\/strong>4. Vulnerability Spotlight: Multiple vulnerabilities in WebKit (<a href=\"https:\/\/blog.talosintelligence.com\/2020\/11\/vuln-spotlight-webkit-use-after-free-nov-2020.html\" target=\"_blank\" rel=\"noreferrer noopener\">Talos Intelligence<\/a>)<br>5. VMware fixes zero-day vulnerability reported by the NSA (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vmware-fixes-zero-day-vulnerability-reported-by-the-nsa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>6. This new cyberattack can dupe DNA scientists into creating dangerous viruses and toxins (<a href=\"https:\/\/www.zdnet.com\/article\/this-new-cyberattack-can-dupe-scientists-into-creating-dangerous-viruses-toxins\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>7. Hackers hide software skimmer in social media sharing icons (<a href=\"https:\/\/www.darkreading.com\/cloud\/researchers-discover-new-obfuscation-as-a-service-platform\/d\/d-id\/1339609\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>8. How the human immune system inspired a new approach to email security (<a href=\"https:\/\/www.theregister.com\/2020\/12\/01\/how_the_human_immune_system\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Register<\/a>)<br>9. Manipulating Systems Using Remote Lasers (<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2020\/12\/manipulating-systems-using-remote-lasers.html\" target=\"_blank\" rel=\"noreferrer noopener\">Schneier on Security<\/a>)<br>10. Malicious npm packages spotted delivering njRAT Trojan (<a href=\"https:\/\/securityaffairs.co\/wordpress\/111751\/hacking\/npm-packages-installs-njrat.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered a campaign affecting Linux systems employing a multi-modular botnet that uses various methods to spread across the network. How does it infect vulnerable infrastructures exactly? Check below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog<\/title>\n<meta name=\"description\" content=\"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-07T07:04:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T11:31:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Xanthe malware spreads using systems with exposed Docker API [Warning]\",\"datePublished\":\"2020-12-07T07:04:11+00:00\",\"dateModified\":\"2023-08-16T11:31:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/\"},\"wordCount\":1561,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/\",\"name\":\"Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-12-07T07:04:11+00:00\",\"dateModified\":\"2023-08-16T11:31:29+00:00\",\"description\":\"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Xanthe malware spreads using systems with exposed Docker API [Warning]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog","description":"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/","og_locale":"pl_PL","og_type":"article","og_title":"Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog","og_description":"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...","og_url":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-12-07T07:04:11+00:00","article_modified_time":"2023-08-16T11:31:29+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Xanthe malware spreads using systems with exposed Docker API [Warning]","datePublished":"2020-12-07T07:04:11+00:00","dateModified":"2023-08-16T11:31:29+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/"},"wordCount":1561,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/","url":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/","name":"Xanthe malware spreads using systems with exposed Docker API [Warning] - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-12-07T07:04:11+00:00","dateModified":"2023-08-16T11:31:29+00:00","description":"Welcome to the next episode of Xopero Security Center. This time we are taking a good look into the Xanthe malware. Cisco Talos recently discovered...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/xanthe-malware-spreads-using-systems-with-exposed-docker-api-warning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Xanthe malware spreads using systems with exposed Docker API [Warning]"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3463"}],"version-history":[{"count":14,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3463\/revisions"}],"predecessor-version":[{"id":5043,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3463\/revisions\/5043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}