When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Hackers have been spotted using the Docker Engine API to target various containers with cryptojackers and othermalware.

The chain starts with data transfer tools which, in turn, deploy XMRig.

An abstract image of a lock against a digital background, denoting cybersecurity.

(Image Credit: TheDigitalArtist / Pixabay)

The cluster allows the crooks to use Docker Swarms orchestration features for command and control tasks.

At press time, the researchers have not yet identified the group behind this campaign.

ViaThe Hacker News

More from TechRadar Pro