Tech

Public DevOps tools targeted by criminals to steal crypto

Share
Share


  • Security researchers Wiz find four major DevOps tools being abused
  • The misconfigurations allow threat actors to deploy cryptocurrency miners
  • A quarter of all instances are at risk, so users should be on their guard

Cybercriminals have been spotted abusing misconfigurations in popular public DevOps tools to deploy cryptocurrency miners – generating valuable tokens, while raking up huge electricity and computing bills for their victims.

Security researchers from Wiz Threat Research spotted the campaign and attributed it to a threat actor named JINX-0132.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
Luma Labs’ new Modify Video tool can reimagine scenes without reshooting
Tech

Luma Labs’ new Modify Video tool can reimagine scenes without reshooting

Luma Labs’ new Modify Video tool for Dream Machine uses AI to...

What NOT to expect at Apple’s WWDC 2025
Tech

What NOT to expect at Apple’s WWDC 2025

No new iPhone expected, not even a hint, really No apologies for...

Just 2% of tidal and offshore solar energy could make a dent in carbon dioxide emissions
Tech

Just 2% of tidal and offshore solar energy could make a dent in carbon dioxide emissions

Graphical abstract. Credit: Renewable and Sustainable Energy Reviews (2025). DOI: 10.1016/j.rser.2025.115563 Harnessing...