* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * Docker Hub镜像中首次发现名为Graboi... # Docker Hub镜像中首次发现名为Graboid的加密挖矿蠕虫病毒 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F10%2Fgraboid-first-ever-cryptojacking-worm%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=Docker+Hub%E9%95%9C%E5%83%8F%E4%B8%AD%E9%A6%96%E6%AC%A1%E5%8F%91%E7%8E%B0%E5%90%8D%E4%B8%BAGraboid%E7%9A%84%E5%8A%A0%E5%AF%86%E6%8C%96%E7%9F%BF%E8%A0%95%E8%99%AB%E7%97%85%E6%AF%92&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F10%2Fgraboid-first-ever-cryptojacking-worm%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2019%2F10%2Fgraboid-first-ever-cryptojacking-worm%2F%3Flang%3Dzh-hans&title=Docker+Hub%E9%95%9C%E5%83%8F%E4%B8%AD%E9%A6%96%E6%AC%A1%E5%8F%91%E7%8E%B0%E5%90%8D%E4%B8%BAGraboid%E7%9A%84%E5%8A%A0%E5%AF%86%E6%8C%96%E7%9F%BF%E8%A0%95%E8%99%AB%E7%97%85%E6%AF%92&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2019/10/graboid-first-ever-cryptojacking-worm/?lang=zh-hans&ts=markdown) \[\](mailto:?subject=Docker Hub镜像中首次发现名为Graboid的加密挖矿蠕虫病毒) Link copied By [Unit 42](https://www.paloaltonetworks.com/blog/author/unit-42/?lang=zh-hans&ts=markdown "Posts by Unit 42") Oct 16, 2019 2 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/Graboid-Worm.jpg) Palo Alto Networks (派拓网络)威胁情报团队[Unit 42](https://unit42.paloaltonetworks.com)近日宣布发现一种新型加密挖矿蠕虫病毒,已有2000多台Docker主机因保护不力而受到感染。Unit 42将该病毒命名为Graboid,是向90年代电影《异形魔怪》致敬,其行为与电影中的沙虫相类似,移动速度较快但总体来讲相对笨拙。 尽管也发生过[以蠕虫病毒形式传播](https://www.bleepingcomputer.com/news/security/malware-spreads-as-a-worm-uses-cryptojacking-module-to-mine-for-monero/)的加密挖矿恶意事件,但这是我们首次在Docker Engine(社区版)中发现借助容器传播的加密挖矿蠕虫病毒。由于多数传统端点防护软件都不检测容器内的数据和活动,因此很难发现这一类型的恶意活动。攻击者首先通过不安全的[Docker Daemon](https://docs.docker.com/engine/api/v1.24/)站稳脚跟,然后在受感染的主机上安装一个Docker镜像并运行。恶意软件从C2服务器上下载并部署完毕后,便开始挖矿寻找[门罗币](https://www.getmonero.org/)。此外,恶意软件会定期从C2服务器搜索新的带有漏洞的主机,然后随机选择下一个目标进行传播。我们的分析表明,挖矿病毒平均有63%的时间处于活跃状态,每个挖矿周期持续250秒。在Unit 42向Docker团队通报该情况后,Docker团队便迅速与Unit 42团队联手删除这些恶意镜像。 **容器化加密挖矿蠕虫病毒** ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/图1.jpg) 图1. 加密挖矿蠕虫病毒活动概览 [Shodan](https://shodan.io/)的快速调查显示,有2,000多个Docker Engine以不安全的方式暴露于互联网。无需任何身份验证或授权,攻击者就可以完全控制Docker Engine(社区版)和主机。恰恰是抓住了这一入口,攻击者才会部署并传播这一蠕虫病毒。图1标明了该恶意软件的分发和传播方式。攻击者入侵了一个未受保护的Docker daemon,运行从Docker Hub中提取的恶意Docker容器,从C2服务器下载一些脚本和易受攻击的主机列表,并反复选取下个目标传播蠕虫。我们称为"Graboid"的恶意软件在容器内进行蠕虫传播和加密挖矿。它在每次迭代中随机选择三个目标,在第一个目标上安装蠕虫,在第二个目标上停止挖矿,在第三个目标上启动挖矿。这种行为导致挖矿行为极度随机。如果我的主机被入侵,恶意容器不会立即启动。相反,我必须等到另一台受感染的主机选择我的主机并启动我的挖矿过程。其他受感染的主机也可以随机停止我的挖矿过程。从本质上讲,每台受感染主机上的挖矿程序都由所有其他受感染主机随机控制。这种随机设计的动机尚不清楚,有可能是因为设计不当,规避技术(效果不佳),自我维持的系统或其他目的。 **以下为具体操作步骤** 1. 攻击者选取某个不安全的docker主机作为攻击目标,然后远程发布指令下载并部署恶意Docker镜像***pocosow/centos:7.6.1810*** . 该镜像含有一个用来与其他Docker主机通信的 [docker client](https://docs.docker.com/engine/docker-overview/#the-docker-client)工具 2. pocosow/centos 容器中的入口脚本/var/sbin/bash会从C2服务器下载4个shell脚本并逐个运行,这4个脚本分别是**sh** , **worm.sh** , **cleanxmr.sh** , **xmr.sh** 3. 脚本**sh**将被攻击主机上的可用CPU数量发送至C2服务器 4. 脚本**sh** 下载一个名为"IP"的文档,其中包含2000多个IP地址。这些IP地址便是那些有着不安全的docker API端点的主机。**Worm.sh** 随机选取一个IP地址作为攻击对象,使用docker client工具远程获取并部署**pocosow/centos** container容器 5. 脚本**sh**随机选取IP文件中某个带有漏洞的主机,终止其上的加密挖矿容器。cleanxmr.sh终止的不仅是蠕虫部署的加密挖矿容器(gakeaws/nginx),也包含少数处于运行状态的xmrig容器 6. 脚本**sh** 随机选取IP文件中某个带有漏洞的主机,然后将镜像**gakeaws/nginx**部署于目标主机之上。gakeaws/nginx含有伪装成为nginx的二进制xmrig 步骤1-6每隔一段时间便会在每个受感染的主机上反复执行,刷新间隔时间设定为100秒。pocosow/centos 容器部署后,刷新间隔时间、shell脚本以及IP文档就会从C2服务器上下载。 在写入期间,如图2所示,Docker镜像**pocosow/centos** 下载次数超过10000次,而**gakeaws/nginx** 也超过6500次\*\*。\*\* 此外,我们还注意到,同一个用户(gakeaws)发布了另外一个加密挖矿镜像**gakeaws/mysql** ,其和**gakeaws/nginx** 内容相同。只有在shell脚本下载并在容器内运行后,**pocosow/centos** 镜像的不良企图才会被察觉。但通过其镜像创建历史,我们也可以轻松发现**gakeaws/nginx**镜像的恶意企图。如图3所示,其只在创建时间栏(第7行)里将二进制xmrig重新命名为nginx。即便如此在创建时间里(第7行)付款地址也以硬编码的形式来应对不断变化的环境。 图4显示了IP地址文件中列出的2,034个易受攻击的主机位置------57.4%的IP地址来自中国,其次有13%来自美国。我们还注意到,在恶意软件使用的15台C2服务器中,有14台主机列在IP地址文件中,剩下的那1台主机有50多个已知漏洞。这表明攻击者可能破坏了这些主机并将其用作C2服务器。通过对Docker daemon的控制,可以轻松部署Web服务器容器(例如httpd、nginx)并将有效负载放置其上。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/图2.jpg) 图2. Docker Hub上恶意Docker镜像 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/图3.jpg) 图3. gakeaws/nginx的镜像历史 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/图4.jpg) 图4. IP文档中漏洞主机的所在国家 **蠕虫仿真** 为了充分了解该蠕虫病毒的有效性及其整体挖矿能力,我们创建了一个简单的Python程序来模拟该蠕虫。假设在IP文档里有2000个主机,其中30%的主机在运行当中失效,设定刷新间隔时间为100秒,每台受感染主机配置一个CPU,该模拟实验时长为30天,我们希望能够找到: 1. 对于蠕虫来讲,要感染全部Docker主机需要多长时间? 2. 攻击者的挖矿能力如何? 3. 每个挖矿程序在被感染的主机上的活跃时间多长? 图5左半部分显示了蠕虫的传播速度。覆盖全部1400台带有漏洞的主机大约用时60分钟(占2000多台主机的70%)。图5右半部分显示受感染主机的整体挖矿能力。任何时候,都会有900个活跃挖矿程序在运行。换句话说,攻击者拥有1400个节点挖矿集群,至少有900个CPU的挖矿能力。由于挖矿程序可以在受感染的主机上随机启动和关闭,挖矿程序的活跃时间只占其全部时间的65%,平均每个挖矿周期仅仅持续250秒。 ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2019/10/图5.png) 图5. 蠕虫仿真 **结论** 尽管这种加密挖矿蠕虫病毒并不涉及复杂的战术、技术或过程,但它可以定期从C2服务器提取新脚本,因此可以轻松将其自身改造成为勒索软件或任何恶意软件,以彻底破坏主机,需引起重视。如果更强大的蠕虫出现并采用类似的传播方式,将会造成更大的破坏,因此组织必须保护其Docker主机。 以下是确保企业免受攻击的最佳实践清单: * 如果没有合适的认证机制,切勿在互联网公开Docker daemon。请注意,缺省情况下,Docker Engine(社区版)不会暴露于互联网 * 使用Unix socket实现与Docker daemon的本地通信,或使用SSH连接到远程Docker daemon。 * 使用防火墙规则将流入较小资源的流量列入白名单 * 切勿从未知注册表或未知用户名称空间提取Docker镜像 * 经常检查系统中是否有未知的容器或镜像 * Prisma Cloud或Twistlock等云安全解决方案可以识别恶意容器并阻止加密采矿等活动 Palo Alto Networks(派拓网络)在本报告中与其他网络威胁联盟成员分享了其发现,包括文件样本和攻击指标。CTA成员使用此情报可快速为其客户部署保护措施,并系统地瓦解恶意网络参与者的入侵。有关网络威胁联盟的更多信息,请访问[www.cyberthreatalliance.org](http://www.cyberthreatalliance.org)。 **攻击指标** **Docker** **镜像** **:** ++pocosow/centos:7.6.1810++: Digest: sha256:6560ddfd4b9af2c87b48ad98d93c56fbf1d7c507763e99b3d25a4d998c3f77cf ++gakeaws/nginx:8.9:++ Digest: sha256:4827767b9383215053abe6688e82981b5fbeba5d9d40070876eb7948fb73dedb ++gakeaws/mysql++: Digest: sha256:15319b6ca1840ec2aa69ea4f41d89cdf086029e3bcab15deaaf7a85854774881 **Monero Address:** 45TwKEr1LjoEPuxnbfuPhaXCf138AoQvtSJ3jdqg1gPxNjkSNbQpzZrGDaFHGLrVT7AzM7tU9QY8NVdr4H1C3r2d3XN9Cty **C2 servers**: 120\.27.32\[.\]15 103\.248.164\[.\]38 101\.161.223\[.\]254 61\.18.240\[.\]160 182\.16.102\[.\]97 47\.111.96\[.\]197 106\.53.85\[.\]204 116\.62.48\[.\]5 114\.67.68\[.\]52 118\.24.222\[.\]18 106\.13.127\[.\]6 129\.211.98\[.\]236 101\.37.245\[.\]200 106\.75.96\[.\]126 47\.107.191\[.\]137 博文英文版详见以下链接:[https://unit42.paloaltonetworks.com/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub/](https://unit42.paloaltonetworks.com/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub/) *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 面对性命攸关的时刻,如何实现可靠的医疗物联网安全](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language