Information securityfromThe Hacker News4 days agoTOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIsA TOR-based cryptojacking campaign exploits exposed Docker APIs to deploy miners, establish persistence, scan for other Docker instances, and potentially build a botnet.
CryptocurrencyfromThe Hacker News3 months agoNew Self-Spreading Malware Infects Docker Containers to Mine Dero CryptocurrencyMisconfigured Docker APIs are exploited in a new malware campaign to create a cryptocurrency mining botnet.