TypeCampaignActors⛵Doki operatorPub. dateJuly 28, 2020Initial accessSoftware misconfigImpactResource hijackingObserved techniquesExploiting host mount to escape to hostTargeted technologiesDockerReferenceshttps://intezer.com/blog/cloud-security/watch-your-containers-doki-infecting-docker-servers-in-the-cloud/https://www.sentinelone.com/blog/defeating-doki-malware-and-container-escapes-with-advanced-linux-behavioral-detection/StatusStubLast editedJun 2, 2024 8:02 AM