Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
An unknown threat actor is exploiting exposed Docker Remote API servers to deploy the perfctl malware. The attack sequence involves probing the server, creating a Docker container with specific settings, and executing a Base64 encoded payload. The payload escapes the container, creates a bash scrip…