Cryptojacking Chaos: Docker APIs and TOR Network Under Siege!
Cybersecurity researchers have discovered a cryptojacking campaign targeting Docker APIs via the TOR network. The attack involves breaking into misconfigured APIs to execute a new container, dropping an XMRig miner. Interestingly, the malware’s source code includes an emoji, suggesting a large language model might’ve been involved—because nothing says “cyber threat” like a joyful emoji.

Hot Take:
Watch out Docker enthusiasts! We’ve got a new cryptojacking variant that’s got a thing for TOR and Docker APIs. It’s like a bad Tinder match you can’t get rid of! Just when you thought your Docker containers were safe, they’re out there dancing with XMRig miners and TOR domains. Who knew Docker APIs could be such party animals? And with a side of Telnet and Chromium remote debugging ports, it’s like a hacker’s all-you-can-eat buffet. Better lock down those containers before they become the life of the cybercrime party!
Key Points:
– A new cryptojacking variant is targeting exposed Docker APIs, using the TOR network for anonymity.
– The attack uses a Base64-encoded payload to download a shell script, altering SSH configurations for persistence.
– Hackers are scanning for open Docker API services on port 2375 but have plans for Telnet and Chromium remote debugging ports.
– The campaign could be a precursor to a more complex botnet, potentially delivering additional payloads.
– Wiz discovered an AWS SES campaign exploiting compromised keys for phishing attacks, with tax-themed lures.