TOR-based cryptojacking attack spreads through misconfigured Docker APIs
Cybersecurity experts have recently uncovered an evolved form of a cryptojacking campaign that leverages the TOR network to target misconfigured Docker APIs. Akamai, which identified this activity in August 2025, reported that the attackers attempt to lock down exposed Docker APIs to prevent other threat actors from gaining access. This development expands on Trend Micro’s […]
TOR-based cryptojacking attack spreads through misconfigured Docker APIs Read More »






