• About
  • Advertise
  • Careers
  • Contact
  • About
Sunday, November 9, 2025
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Cryptocurrency miners exploit Docker flaw

in Tech
Cryptocurrency miners exploit Docker flaw
0
SHARES
15
VIEWS
Share on FacebookShare on Twitter

According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker’s remote API has already been taken advantage of by hundreds of attackers.

Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were running a cryptocurrency miner for a lesser-known form of cryptocurrency called Monero.

Monero (ticker symbol XMR) is an open-source cryptocurrency that was created in April 2014. It focuses on fungibility (individual units are essentially interchangeable), privacy, and decentralization. It also takes advantage of an obfuscated public ledger. That means anyone can broadcast or send transactions, but outside observers cannot tell the source, amount, or destination of the funds.

Mining cryptocurrencies on compromised Docker hosts is, as you’d likely expect, only one form of attack that is possible. Others — such as launching botnets or stealing credential and data — are also likely exploits.

Imperva has stressed that is it critical that anyone exposing Docker ports make sure that they create security controls that allow only trusted sources to interact with the Docker API. Refer to the Docker documentation on Securing Docker remote daemonfor more information on how to enforce security controls.

Details on Imperva’s findings are available at imperva.com.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes
Free Download WordPress Themes
Download Premium WordPress Themes Free
Download Best WordPress Themes Free Download
free online course
download karbonn firmware
Premium WordPress Themes Download
ZG93bmxvYWQgbHluZGEgY291cnNlIGZyZWU=
Tags: Related: Security Linux
ADVERTISEMENT
Next Post
The Open Compute Project is quickly gaining ground

The Open Compute Project is quickly gaining ground

Recommended

HPE promises 100% reliability with its new storage system

HPE promises 100% reliability with its new storage system

Google claims quantum supremacy over supercomputers

Google claims quantum supremacy over supercomputers

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In