I set up the server some days ago and installed a Portainer agent, but didn't configure it yet. Seems this is an ideal entry point for the #perfctl/#perfcc malware and a rootkit to use the server for CryptoJacking and ProxyJacking. The #Portainer agent waits for an initial connection from the Portainer server (and does so after every restart) - but if the attacker comes first, he wins. 🙄
Long story short: I reinstalled the server from scratch, use the Portainer Edge agent from now on (which reverses the communication direction) and have an even closer look on my monitoring.
More infos about the attack vector can be found here:
https://blog.exatrack.com/Perfctl-using-portainer-and-new-persistences/
-




