Hackers have been spotted using the Docker Engine API to target various containers with cryptojackers and other malware.

Cybersecurity researchers at Datadog, who recently observed one such campaign and reported on it in an in-depth analysis, noted the criminals first looked for internet-exposed Docker Engine APIs that are not password-protected, using different internet scanning tools.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *