Public DevOps tools targeted by criminals to steal crypto




  • Security researchers Wiz find four major DevOps tools being abused
  • The misconfigurations allow threat actors to deploy cryptocurrency miners
  • A quarter of all instances are at risk, so users should be on their guard

Cybercriminals have been spotted abusing misconfigurations in popular public DevOps tools to deploy cryptocurrency miners – generating valuable tokens, while raking up huge electricity and computing bills for their victims.

Security researchers from Wiz Threat Research spotted the campaign and attributed it to a threat actor named JINX-0132.

https://cdn.mos.cms.futurecdn.net/y6zPwEotfPu3Mzhft3hCsH.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img