Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto Heist


Dark Reading
Attackers Target Docker APIs in Stealthy Crypto Heist
The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocur...










