‘Proxyjacking’ Cybercriminals Exploit Log4j in Emerging, Lucrative Cloud Attacks

Cyber threat actors have started using a new attack vector named “proxyjacking”, which hijacks legitimate proxyware services that allow people to sell portions of their internet bandwidth to third parties. According to the Sysdig Threat Research Team, criminals could earn huge sums per month through these large-scale attacks exploiting cloud-based systems. Attackers use methods such as container compromise and Log4j vulnerability exploits to take control of systems and earn profits.