Hackers abuse TOR network and misconfigured Docker APIs to steal crypto – so keep an eye on your wallet




  • Attackers exploit exposed Docker APIs to deploy cryptojackers and scan for more targets
  • The malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and may evolve into a botnet
  • Akamai urges isolating Docker, limiting exposed services, and more

Cybercriminals are targeting exposed Docker APIs to install cryptojackers, scan the internet for more potential victims, and possibly even build out a botnet.

Recently, security researchers from Akamai wrote an in-depth report about a new campaign, seemingly a continuation of a similar one that was spotted by Trend Micro in late June 2025.



Source link

Leave a Reply

Translate »
Share via
Copy link