Hackers are scanning for Docker hosts with exposed APIs to use them for cryptocurrency mining by deploying malicious self-propagating Docker images infected with Monero miners and scripts that make use of Shodan to find other vulnerable targets. […]
Category: Tech Blog