Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist

The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.

Go to Source
Author: Elizabeth Montalbano, Contributing Writer

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.