Cryptomining Attack Exploits Docker API Misconfiguration Since 2019
Campaign exploits misconfigured Docker APIs to gain network entry and ultimately sets up a backdoor on compromised hosts to mine cryptocurrency.
Source: threatpost.com and Read More