BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Attackers Abuse Docker APIs and Tor to Launch Cloud Cryptojacking

Attackers Exploit Misconfigured Docker APIs via Tor to Deploy Hidden Crypto Miners in the Cloud

  • Attackers are exploiting misconfigured Docker APIs to mine cryptocurrency in cloud environments.
  • They use the Tor network to hide their activities while deploying crypto miners.
  • Attackers gain access, create new containers, and mount critical system directories, risking container escapes.
  • The attack involves installing tools and scripts to set up remote access, collect data, and install the XMRig miner.
  • Recent findings show hundreds of leaked credentials in public code repositories, exposing companies to further risk.

An active campaign is targeting misconfigured Docker instances to secretly mine cryptocurrency, according to findings by Trend Micro researchers released in June 2025. Attackers reportedly exploit misconfigured Docker APIs, using the Tor network to remain anonymous as they deploy crypto mining tools onto vulnerable cloud-hosted containers.

- Advertisement -

Researchers observed that the attack typically starts with a request to the Docker API to retrieve a list of containers on the host. If no containers exist, the attackers create a new container using the "alpine" image and mount the host system’s root directory as a shared volume. This step can allow attackers to bypass container isolation and access files on the host machine, raising the risk of broader system compromise.

Trend Micro states that after establishing a new container, the attackers run a Base64-encoded shell script to install Tor within the container. They then download and execute a remote script hosted on a .onion address, using tools and settings such as "socks5h" to route all traffic through Tor. According to the researchers, "It reflects a common tactic used by attackers to hide command-and-control (C&C) infrastructure, avoid detection, and deliver Malware or miners within compromised cloud or container environments," adding that this method complicates efforts to trace the origin of the attack.

Once the environment is set up, the attackers deploy a shell script named "docker-init.sh." This script checks if the "/hostroot" directory is mounted, changes SSH configurations to enable root logins, and adds an attacker’s SSH key for future access. Additional tools, such as masscan and torsocks, are installed, allowing the attackers to scan networks and further evade detection. The attack culminates with the installation of an XMRig cryptocurrency miner, configured with wallet addresses and mining pools controlled by the threat actors.

Trend Micro notes that this activity primarily targets technology, financial, and healthcare sectors. The company also highlights a related security risk after Wiz discovered that hundreds of sensitive credentials have surfaced in public repositories, including files in Python notebooks and application configuration files, with affected organizations ranging from startups to Fortune 100 companies. The researchers caution that results from code execution in shared Python notebooks can reveal valuable information to attackers capable of linking it back to their sources.

- Advertisement -

The trend underscores the importance of securing cloud and container environments, especially as attackers continue to automate exploits and look for exposed credentials across public code repositories.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Justin Sun’s $70M Frozen in Trump-Linked Crypto Project

Justin Sun had approximately 544 million World Liberty Financial tokens frozen in September 2024...

BTC to Bottom at $55K in 2026 Before Bull Run

New analysis from CryptoQuant predicts Bitcoin will bottom near $55,000-$60,000 in late 2026.The forecast...

Marimo Critical Flaw Exploited in Under 10 Hours

A critical security vulnerability (CVE-2026-39987) in the open-source Python notebook Marimo was exploited within...

Bitcoin QuantumSafe Plan Costly, No Fork Needed

A researcher has proposed a quantum-safe Bitcoin transaction scheme that works without changing the...

TD Cowen Downgrades MSTR Target, Calls Sharplink a ‘Buy’

TD Cowen has initiated coverage of Ethereum treasury firm Sharplink with a "buy" rating,...

Must Read

What Is Bcrypt Password Hashing Function?

KEY TAKEAWAYSBcrypt is a password hashing function that transforms plain passwords into unique alphanumeric sequences.It is a one-way process, ensuring that passwords cannot be...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading