Threat Actors Exploit Docker and Kubernetes for Crypto Mining

Amber | Attack Report
Download PDF

A new cryptojacking campaign that exploits Docker and Kubernetes environments to mine cryptocurrency by accessing exposed Docker API endpoints without authentication. The attack enables lateral movement within cloud infrastructures, allowing threat actors to compromise multiple systems by leveraging malicious Docker images and scripts. This campaign highlights the urgent need for enhanced security measures in containerized infrastructures to prevent exploitation.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox