Nov. 14, 2023, 11:54 a.m. | (The Hacker News)

The Hacker News

Publicly-accessible Docker Engine API instances are being targeted by threat actors as part of a campaign designed to co-opt the machines into a distributed denial-of-service (DDoS) botnet dubbed OracleIV.
"Attackers are exploiting this misconfiguration to deliver a malicious Docker container, built from an image named 'oracleiv_latest' and containing Python malware compiled as an ELF executable

alert api apis attackers botnet campaign container containers ddos distributed docker docker engine engine exploiting hijack image machines malicious misconfiguration oracleiv public service threat threat actors

Senior Vice President, Cybersecurity and Runtime Operations

@ 2U | US-MD-Lanham//US-Remote

Dreadnought Product Security Lead - Submarines

@ Rolls-Royce | Derby - Jubilee House (UK-JH)

Senior Product Security Engineer

@ Narvar | Hybrid - Bengaluru

Managing Consultant - Advisors Business Development

@ Mastercard | Mumbai, India

Principal Security Engineer

@ Highspot | Vancouver, BC

Incident Response Specialist

@ Wabtec | Bengaluru - KA - IND (ITC Greens)