• About
  • Advertise
  • Careers
  • Contact
  • About
Sunday, April 19, 2026
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Cryptocurrency miners exploit Docker flaw

in Tech
Cryptocurrency miners exploit Docker flaw
0
SHARES
17
VIEWS
Share on FacebookShare on Twitter

According to Imperva research, a container flaw reported last month (CVE-2019-5736) in Docker’s remote API has already been taken advantage of by hundreds of attackers.

Imperva claims that they were able to locate 3,822 Docker hosts with the remote API (port 2735) publicly exposed. Of these, approximately 400 were accessible, and most of these were running a cryptocurrency miner for a lesser-known form of cryptocurrency called Monero.

Monero (ticker symbol XMR) is an open-source cryptocurrency that was created in April 2014. It focuses on fungibility (individual units are essentially interchangeable), privacy, and decentralization. It also takes advantage of an obfuscated public ledger. That means anyone can broadcast or send transactions, but outside observers cannot tell the source, amount, or destination of the funds.

Mining cryptocurrencies on compromised Docker hosts is, as you’d likely expect, only one form of attack that is possible. Others — such as launching botnets or stealing credential and data — are also likely exploits.

Imperva has stressed that is it critical that anyone exposing Docker ports make sure that they create security controls that allow only trusted sources to interact with the Docker API. Refer to the Docker documentation on Securing Docker remote daemonfor more information on how to enforce security controls.

Details on Imperva’s findings are available at imperva.com.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Premium WordPress Themes Download
Download Nulled WordPress Themes
Download Nulled WordPress Themes
Download Nulled WordPress Themes
lynda course free download
download intex firmware
Download Nulled WordPress Themes
free online course
Tags: Related: Security Linux
ADVERTISEMENT
Next Post
The Open Compute Project is quickly gaining ground

The Open Compute Project is quickly gaining ground

Recommended

Cisco issues critical security warnings on SD-WAN, DNA Center

Cisco issues critical security warnings on SD-WAN, DNA Center

COVID-19 to delay enterprise 5G adoption

COVID-19 to delay enterprise 5G adoption

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In