June 17, 2024, 7:53 a.m. | Guru baran

GBHackers On Security gbhackers.com

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart (remote access with payload execution), exeremo (lateral movement through SSH), and vurld (Go downloader for malware retrieval) and a persistence mechanism that modifies systemd services with ExecStartPost for malicious commands.  It targets Docker API endpoints […]


The post Hackers Employing New Techniques To Attack Docker API appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform …

access api attack attackers campaign commands cryptocurrency hack cryptojacking cyber-attack docker docker engine docker security downloader engine exposed hackers hosts lateral lateral movement malicious malicious commands malware malware analysis mechanism payload persistence remote access services ssh systemd system persistence targeting techniques using yarn

Information Technology Specialist I: Windows Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, California

Information Technology Specialist I, LACERA: Information Security Engineer

@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA

Vice President, Controls Design & Development-7

@ State Street | Quincy, Massachusetts

Vice President, Controls Design & Development-5

@ State Street | Quincy, Massachusetts

Data Scientist & AI Prompt Engineer

@ Varonis | Israel

Contractor

@ Birlasoft | INDIA - MUMBAI - BIRLASOFT OFFICE, IN