Get a Pentest and security assessment of your IT network.

Cyber Security

Exposed Docker APIs Continue to Be Used for Cryptojacking

Exposed Docker APIs continue to be used by attackers to create new containers that perform cryptojacking. Trend Micro has spotted an attacker that is scanning for exposed Docker Engine APIs and utilizing them to deploy containers that download and execute a coin miner. With this method, a large amount of Docker Engine containers can be amassed that mine coins for the attacker. To prevent attackers from exploiting insecure Docker Engine implementations, administrators should use the following security practices: Administrators should lock down their systems and install hardening Docker Engine servers.

Source: https://www.bleepingcomputer.com/news/security/exposed-docker-apis-continue-to-be-used-for-cryptojacking/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security