Hackers abuse Tor’s network and poorly configured Docker APIS




  • The attackers exploit the Docker APIs presented to implement cryptojackers and scan for more objectives
  • Malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and can evolve to a botnet
  • Akamai urges to isolate Docker, limit the services set out and more

Cybercounts are pointing to the Docker APIs presented to install cryptojackers, scan the Internet to get more potential victims and possibly even build a botnet.

Recently, Akamai security researchers wrote an in -depth report on a new campaign, apparently a continuation of a similar one that was seen by Trend Micro at the end of June 2025.

Leave a Comment

Your email address will not be published. Required fields are marked *