Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist | Haber Detay
Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist
Category: Dark Reading | Date: 2025-06-25 11:19:39
The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.