Malware targets Docker servers hosted with popular cloud platforms, including AWS, Azure, and Alibaba Cloud. Multi-threaded malware leverages undocumented method to contact its operator by abusing the Dogecoin cryptocurrency blockchain in a unique way in order to dynamically generate its C2 domain address. The malware managed to stay under the radar for more than six months despite having been uploaded to VirusTotal on January 14, 2020, and scanned multiple times since. It’s still undetectable by any of the 61 top malware detection engines at the time of writing.
Source: https://thehackernews.com/2020/07/docker-linux-malware.html

