Sept. 15, 2023, 11:25 p.m. | /u/platypus_plumba

cybersecurity www.reddit.com

I'm not in the cybersecurity field, I'm just curious about how these miners are hidden in the Docker images that we pull from Dockerhub.

My initial guess was that some of the binaries in the image are tampered with to hide the processes being executed, for example tampering "ps" or "ls". But this seemed like a pointless approach because the user could install other tools that would reveal the processes.

I don't want to list my whole noob thought process …

cybersecurity docker dockerhub hidden hide image images malware miners processes tampering xmrig

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts