Cryptomining
Hackers Exploit Docker APIs Using Tor, Build Self-Propagating Botnet
Cybersecurity researchers have discovered a sophisticated new attack campaign exploiting exposed Docker APIs and hiding its tracks through the Tor network. The attack, first flagged…