Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network,
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments.
« Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners, » Trend Micro researchers Sunil Bharti and Shubham Singh said in an
« Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners, » Trend Micro researchers Sunil Bharti and Shubham Singh said in an
,
Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments.
« Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners, » Trend Micro researchers Sunil Bharti and Shubham Singh said in an
« Attackers are exploiting misconfigured Docker APIs to gain access to containerized environments, then using Tor to mask their activities while deploying crypto miners, » Trend Micro researchers Sunil Bharti and Shubham Singh said in an
, ,
https://thehackernews.com/2025/06/hackers-exploit-misconfigured-docker.html