התחל במצב לא מקוון עם האפליקציה Player FM !
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
Manage episode 486645273 series 3645080
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale.
We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning enterprise-grade compute resources into crypto-mining farms, all while staying under the radar. This campaign marks the first publicly documented exploitation of HashiCorp Nomad in the wild.
We discuss:
- How attackers used XMRig, cron jobs, and process-hiding tools to persist and evade detection
- The impact of misconfiguration and unpatched vulnerabilities in fast-moving DevOps workflows
- The financial and operational cost of unauthorized crypto mining in the cloud
- The role of DevSecOps in preventing these attacks, with actionable recommendations for securing your containers and runtimes
- Key practices to “shift left” and catch security flaws early in the software development lifecycle
- Why Cloud Workload Protection Platforms (CWPP) are becoming essential in defending modern cloud-native environments
We also highlight best practices for hardening Docker images, avoiding privileged containers, monitoring system behavior, and responding to incidents with speed and precision.
151 פרקים
Manage episode 486645273 series 3645080
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale.
We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning enterprise-grade compute resources into crypto-mining farms, all while staying under the radar. This campaign marks the first publicly documented exploitation of HashiCorp Nomad in the wild.
We discuss:
- How attackers used XMRig, cron jobs, and process-hiding tools to persist and evade detection
- The impact of misconfiguration and unpatched vulnerabilities in fast-moving DevOps workflows
- The financial and operational cost of unauthorized crypto mining in the cloud
- The role of DevSecOps in preventing these attacks, with actionable recommendations for securing your containers and runtimes
- Key practices to “shift left” and catch security flaws early in the software development lifecycle
- Why Cloud Workload Protection Platforms (CWPP) are becoming essential in defending modern cloud-native environments
We also highlight best practices for hardening Docker images, avoiding privileged containers, monitoring system behavior, and responding to incidents with speed and precision.
151 פרקים
All episodes
×
1 Fasana’s Collapse: How One Ransomware Attack Crippled a German Manufacturer 41:37

1 Inside the 16 Billion Credential Leak: The Infostealer Engine Behind the Biggest Breach Yet 54:27

1 Over 1,500 Minecraft Users Infected in Stargazers Ghost Malware Campaign 55:17

1 Weaponized GitHub Repositories: How Banana Squad and Water Curse Are Hitting Devs 45:59

1 Chain IQ Breach Exposes UBS & Pictet Employee Data: A Supply Chain Failure 1:05:22

1 Oxford City Council Breach Exposes 21 Years of Data 35:51

1 Citrix NetScaler Flaws Expose Enterprise Networks: CVE-2025-5349 & CVE-2025-5777 38:12

1 GerriScary: How CVE-2025-1568 Threatened Google’s Open-Source Supply Chain 35:21

1 Cisco & Atlassian Under Fire: High-Severity Flaws and What’s at Risk 53:38

1 Double Extortion, Biometric Data, and Donuts: How Play Ransomware Hit Krispy Kreme 50:51

1 Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel 54:53

1 KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed 1:07:13

1 DragonForce Ransomware: The Evolving Threat to Healthcare Data 39:12

1 Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab? 1:02:01

1 SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms 1:03:42

1 TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming 1:01:04

1 Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows 44:04

1 WestJet Cyberattack: Cracks in Aviation’s Digital Armor 25:52

1 Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras 49:37

1 Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists 1:10:32

1 zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security 51:51

1 Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions 34:42

1 9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency 32:08

1 Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks 12:27

1 The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure 14:39

1 Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack 34:49

1 TxDOT Data Leak: 423,391 Texans Exposed 44:32

1 Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid 43:49

1 Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code 41:15

1 Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns 43:52
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.