Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New York won’t retract Native American mascot ban despite Trump’s threat

Things the Trump administration needs to know when tuition fees for students without legal status target breaks

Top 10 Startup and Tech Funding News – June 5, 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Cryptojacking campaign explores the DevOps API using ready-made tools from GitHub
Identity

Cryptojacking campaign explores the DevOps API using ready-made tools from GitHub

userBy userJune 2, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers discover new cryptocurrency jacking campaigns targeting publicly accessible DevOps web servers such as Docker, Gitea, Hashicorp Consul and Nomad, and illegally mine cryptocurrency.

Wiz, a cloud security company that tracks activities under the name Jinx-0132, said attackers are leveraging a wide range of known misconceptions and vulnerabilities to provide payloads for miners.

“In particular, this campaign marks what we believe is the first published case of nomadic misconceptions being misused as wild attack vectors,” researchers Giri Tikochinsky, Daniel Aminov and Merab Barr said in a report shared with Hacker News.

What makes these attacks stand out even more is that bad actors download the necessary tools directly from the GitHub repository, rather than using their own infrastructure for staging purposes. The use of ready-made tools is seen as a deliberate attempt to cloud attribution efforts.

JINX-0132 is said to have compromised on a nomadic instance that manages hundreds of clients that cost tens of thousands of dollars a month, given the total CPU and RAM resources. This also helps to highlight the computing power that drives cryptojacking activity.

Cybersecurity

It is worth mentioning that the exploitation of the Docker API is a well-known launchpad for such attacks. Last week, Kaspersky revealed that threat actors were targeting misconfigured Docker API instances and joining them in cryptocurrency mining botnets.

Spin up containers that mount exposed Docker API instance host filesystems Open the door to execute malicious code by spinning up containers or by invoking standard Docker endpoints like “/containers/creeve” or “/containers/{id}/start” to launch cryptocurrency images.

Wiz said threat actors are also taking advantage of Gitea’s vulnerabilities (e.g. CVE-2020-14144) or the misconceptions of Gitea, a lightweight open source solution for hosting Git repositories, to gain early scaffolding for targets.

Specifically, if an attacker can access an existing user with permission to create a Git hook, if he is running version 1.4.0 or the installation page remains unlocked, then public instances of Gitea are known to be vulnerable to remote code execution (i.e. install_lock = false).

Similarly, HashiCorp Consul can pave the way for arbitrary code execution if the system is not properly configured and users with remote access to the server can register services and define health checks.

“The campaign organized by Jinx-0132 added a malicious check that it abused this ability and actually ran mining software,” Wiz says. “Jinx-0132 adds multiple services with seemingly random names that are actually intended to download and run the Xmrig payload.”

It has also been observed that JINX-0132 exploits false obscurity in the published NOMAD server API to create multiple new jobs on compromised hosts responsible for downloading and running the Xmrig Miner payload from GitHub. The attacks depend on the fact that Nomad is not unsafe to create and run these jobs.

“This default configuration effectively means that unlimited access to the server API can be exposed to the Remote Code Execution (RCE) functionality of the server itself and all connected nodes,” Wiz says.

According to Shodan data, there are over 5,300 exposed consul servers and over 400 exposed Nomad servers worldwide. Most of the exposure is concentrated in China, the US, Germany, Singapore, Finland, the Netherlands and the UK.

Attackers exploit open webUI systems exposed to the internet to run minors

This disclosure comes when Sysdig uncovers details about malware campaigns targeting Linux and Windows by leveraging the misunderstood system that hosts Open WebUI to upload artificial intelligence (AI)-generated Python scripts and ultimately providing cryptocurrency miners.

“The exposure to the internet allowed anyone to execute commands on their systems. A dangerous mistake attacker is a dangerous mistake that is actively scanning,” security researchers Miguel Hernandez and Alessandra Rizzo said in a report shared with the publication.

“When attackers discover an exposed training system, they have started using Open WebUI tool, a plugin system used to enhance LLM functionality. OpenWebUI allows you to upload Python scripts to extend functionality.

According to Sysdig, Python code is designed to download and run cryptocurrency miners like T-Rex and Xmrig, creating a SystemD service for Persistence and using Discord Webhook for command and control (C2). The malware also includes libraries such as Processshider and Argvhider, which hides the mining process on Linux systems and acts as a defense evasion tactic.

Cybersecurity

On compromised Windows systems, the attacks proceed along a similar line, but also require the deployment of the Java Development Kit (JDK) to run the JAR file (“Application-Ref.jar”).[.]155. The JAR file acts as a Java-based loader that runs the secondary JAR payload for that part.

The attack chain culminates in the execution of two files “int_d.dat” and “int_j.dat” that are equipped to steal credentials related to inconsistencies and cryptocurrency wallet extensions set up in Google Chrome.

Sysdig said there are over 17,000 Open WebUI instances accessible via the internet. However, it is not clear how many other security weaknesses are actually misunderstood or susceptible to them.

“The accidental misconceptions of systems like open WebUI being exposed to the Internet remain a serious problem,” the researchers said. “The attackers targeted both Linux and Windows systems, including Windows versions, including sophisticated Infostealer and Evasion Techniques.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNueva Era para el Acceso Digital: Alcolea de Calatrava da la Bienvenida a un Revolucionario Hub de Innovación
Next Article Microsoft invests $400 million in Switzerland, doubling European AI and Cloud Push
user
  • Website

Related Posts

The Digital Driver’s License (DDL): Is Your ID Ready for the Virtual Era?

June 5, 2025

Popular Chrome Extensions leak API keys, user data over HTTP, and hardcoded credentials

June 5, 2025

Researchers detail the evolving tactics of bitter apt as its geographical extent expands

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New York won’t retract Native American mascot ban despite Trump’s threat

Things the Trump administration needs to know when tuition fees for students without legal status target breaks

Top 10 Startup and Tech Funding News – June 5, 2025

Trump and Musk vomit and leave doge Bad for Doge Coin

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startup and Tech Funding News – June 5, 2025

AI Startup Filament Syfter raises $4.8 million to fix broken data stacks with private equity

Reddit sues mankind to train AI model Claude without permission by cutting down user data

Automatic transportation startup plus is published at a $1.2 billion valuation in SPAC transactions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.