URL has been copied successfully!
Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist

The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.

First seen on darkreading.com

Jump to article: www.darkreading.com/cloud-security/attackers-docker-apis-tor-anonymity-crypto-heist

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link