Hackers abuse TOR network and misconfigured Docker APIs to steal crypto – so keep an eye on your wallet

Hackers abuse TOR network and misconfigured Docker APIs to steal crypto – so keep an eye on your wallet

Hackers abuse TOR network and misconfigured Docker APIs to steal crypto – so keep an eye on your wallet


  • Attackers exploit exposed Docker APIs to deploy cryptojackers and scan for more targets
  • The malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and may evolve into a botnet
  • Akamai urges isolating Docker, limiting exposed services, and more

Cybercriminals are targeting exposed Docker APIs to install cryptojackers, scan the internet for more potential victims, and possibly even build out a botnet.

Recently, security researchers from Akamai wrote an in-depth report about a new campaign, seemingly a continuation of a similar one that was spotted by Trend Micro in late June 2025.



Source link

Also Read  I spent two weeks with the Honor Pad V9, and it's one of the best mid-range Android slates on the market.
Back To Top