Today > | 1 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report details a cryptojacking campaign exploiting exposed Docker remote API servers. Threat actors employ the cmd.cat/chattr Docker image for initial access, utilizing techniques like chroot and volume binding to break out of the container and access host systems. They deploy cryptocurrency m…