Public Devops tools directed by criminals to steal cryptography


  • WIZ security researchers find four main tops tools that are abusing
  • Erroneous configurations allow threat actors to deploy cryptocurrency miners
  • A quarter of all cases are at risk, so users must be on guard

Cybercriminals have been abusing erroneous configurations in popular public Devops tools to display cryptocurrency miners, generating valuable tokens, while huge electricity and computer bills increase for their victims.

Wiz’s security researchers threaten Research saw the campaign and attributed it to a threat actor named Jinx-0132.

Leave a Comment

Your email address will not be published. Required fields are marked *