Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cryptojackers Caught Mining Monero via Exposed DevOps Infrastructure

Posted on June 2, 2025June 2, 2025 By CWS

Safety researchers at Wiz on Monday raised an alarm catching a malicious hacker hijacking misconfigured DevOps infrastructure for cryptocurrency mining in what seems to be the primary documented abuse of HashiCorp Nomad servers within the wild. 

The marketing campaign, energetic since at the least April, additionally latches onto uncovered Consul dashboards, Docker Engine APIs and Gitea code-hosting situations to push the open-source XMRig miner, all fetched instantly from public GitHub releases to keep away from leaving simple forensic fingerprints. 

In keeping with documentation from Wiz, hackers are abusing the HashiCorp Nomad job-queue API when directors depart the scheduler in its default, unauthenticated state.

Wiz mentioned its menace hunters watched the attackers drop shell instructions that obtain and launch the Monero cryptocurrency miner, then repeat the trick throughout dozens of randomly named jobs. 

Wiz famous that Consul’s service-health checks, Docker’s unsecured TCP socket and a number of other long-patched Gitea vulnerabilities present comparable remote-code-execution openings when left uncovered.

The cloud safety vendor mentioned its telemetry suggests 1 / 4 of cloud environments run at the least one among these DevOps instruments with about 5% instantly reachable from the web, and practically a 3rd of these internet-facing deployments are wide-open by way of dangerous defaults or skipped hardening. 

“Amongst these uncovered deployments, 30% are misconfigured,” Wiz warned.

In a single case, Wiz researchers mentioned the attackers tapped a Nomad cluster with tons of of purchasers whose mixed CPU and RAM would price “tens of 1000’s of {dollars} per 30 days” if paid for legitimately, sources that as an alternative churned out cryptocurrency on behalf of a single pockets tackle. Commercial. Scroll to proceed studying.

“A key attribute of this menace actor’s methodology is the deliberate avoidance of distinctive, conventional identifiers that may very well be utilized by defenders as IOCs. As an alternative, they obtain instruments instantly from public GitHub repositories and depend on customary launch variations of XMRig fairly than customized malware,” Wiz famous.

As an alternative, the corporate recommends locking down Nomad and Consul with ACLs, conserving Gitea absolutely patched, and by no means exposing the Docker API to the open web. 

“Misconfiguration abuse by menace actors can usually go beneath defenders’ radar, particularly if the affected utility isn’t properly often called an assault vector,” Wiz researchers mentioned.

Associated: US Sanctions Philippine Firm for Supporting Crypto Scams

Associated: Cryptocurrency Thieves Hijacking Zoom ‘Distant Management’ Characteristic

Associated: US Seizes Garantex in Cryptocurrency Cash Laundering Bust

Associated: How Social Engineering Sparked a Billion-Greenback Provide Chain Cryptocurrency Heist

Security Week News Tags:Caught, Cryptojackers, DevOps, Exposed, Infrastructure, Mining, Monero

Post navigation

Previous Post: Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection
Next Post: Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

Related Posts

Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
US Deportation Airline GlobalX Confirms Hack Security Week News
Inside the $111 Billion Cloud Security Market: Acquisition, Expansion, and Where to Aim Next Security Week News
ThreatSpike Raises $14 Million in Series A Funding Security Week News
Backdoored Open Source Malware Repositories Target Novice Cybercriminals Security Week News
US Announces Botnet Takedown, Charges Against Russian Administrators Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News