Tech »  Topic »  Hackers abuse TOR network and misconfigured Docker APIs to steal crypto - so keep an eye on your wallet

Hackers abuse TOR network and misconfigured Docker APIs to steal crypto - so keep an eye on your wallet


  • Attackers exploit exposed Docker APIs to deploy cryptojackers and scan for more targets
  • The malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and may evolve into a botnet
  • Akamai urges isolating Docker, limiting exposed services, and more

Cybercriminals are targeting exposed Docker APIs to install cryptojackers, scan the internet for more potential victims, and possibly even build out a botnet.

Recently, security researchers from Akamai wrote an in-depth report about a new campaign, seemingly a continuation of a similar one that was spotted by Trend Micro in late June 2025.

The campaign revolves around looking for servers with Docker’s API exposed on port 2375. Once identified, the crooks create a new container and pull down a script from a hidden TOR browser (.onion) website.

Are they brave or stupid? Malware targeting Russian crypto hackers found

Cryptojacking botnet

The script tweaks systems settings to establish ...


Copyright of this story solely belongs to techradar.com . To see the full text click HERE