More

    Hackers abuse TOR network and misconfigured Docker APIs to steal crypto – so keep an eye on your wallet




    • Attackers exploit exposed Docker APIs to deploy cryptojackers and scan for more targets
    • The malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and may evolve into a botnet
    • Akamai urges isolating Docker, limiting exposed services, and more

    Cybercriminals are targeting exposed Docker APIs to install cryptojackers, scan the internet for more potential victims, and possibly even build out a botnet.

    Recently, security researchers from Akamai wrote an in-depth report about a new campaign, seemingly a continuation of a similar one that was spotted by Trend Micro in late June 2025.

    https://cdn.mos.cms.futurecdn.net/nsvXLHiVRRsmD2mqF3oLYo.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    spot_imgspot_img