More

    Public DevOps tools targeted by criminals to steal crypto




    • Security researchers Wiz find four major DevOps tools being abused
    • The misconfigurations allow threat actors to deploy cryptocurrency miners
    • A quarter of all instances are at risk, so users should be on their guard

    Cybercriminals have been spotted abusing misconfigurations in popular public DevOps tools to deploy cryptocurrency miners – generating valuable tokens, while raking up huge electricity and computing bills for their victims.

    Security researchers from Wiz Threat Research spotted the campaign and attributed it to a threat actor named JINX-0132.

    https://cdn.mos.cms.futurecdn.net/y6zPwEotfPu3Mzhft3hCsH.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img