Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network: A Growing Threat to Cloud Security


A new vulnerability has been discovered that allows attackers to exploit misconfigured Docker APIs and mine cryptocurrency using the Tor anonymity network, posing significant risks to cloud security. Hackers are taking advantage of poorly secured containerized environments by exploiting the API vulnerabilities and deploying crypto miners through the Tor network. The attack vector is part of a larger trend of cyber attacks targeting vulnerable cloud environments.

  • Hackers exploit misconfigured Docker APIs to mine cryptocurrency using Tor anonymity network.
  • Attackers create a new Docker instance, access host system files, and deploy crypto miners via Tor.
  • Use of Base64-encoded shell scripts, socks5h, and other tools to establish connection with C&C server and deliver malware/miners.
  • Posses significant risks to cloud security, particularly for technology companies, financial services, and healthcare organizations.
  • Attack vector highlights importance of properly securing cloud environments and following best practices to prevent attacks.


  • Hackers have been exploiting misconfigured Docker APIs to mine cryptocurrency using the Tor anonymity network, a trend that poses significant risks to cloud security. The attack vector involves attackers gaining access to containerized environments through Docker APIs and then deploying crypto miners using the Tor network to mask their activities.

    According to Trend Micro researchers Sunil Bharti and Shubham Singh, who analyzed the attacks, attackers are exploiting misconfigured Docker APIs to gain access to containerized environments. They create a new Docker instance based on the "alpine" image and mount the "/hostroot" directory as a volume inside it, allowing the container to access and modify files and directories on the host system.

    The threat actors then execute a carefully orchestrated sequence of actions that involves running a Base64-encoded shell script to set up Tor on the container. This setup allows the attacker to route all traffic and DNS resolution through Tor for enhanced anonymity and evasion. The attackers also use "socks5h" to establish a connection with a command-and-control (C&C) server, where they deliver malware or miners.

    Once the container is created, the threat actor deploys a binary that acts as a dropper for the XMRig cryptocurrency miner, along with necessary mining configuration and wallet addresses. The attackers use this setup to mine cryptocurrency in susceptible environments without being detected.

    This attack vector poses significant risks to cloud security, particularly for technology companies, financial services, and healthcare organizations. The trend of exploiting misconfigured Docker APIs is part of a larger pattern of cyber attacks that target vulnerable cloud environments.

    In recent months, the cybersecurity firm Wiz has revealed that hundreds of validated secrets have been uncovered in public code repositories, turning them into a treasure trove for attackers. This finding highlights the importance of properly securing cloud environments and following best practices to prevent such attacks.

    The attackers use various tools like masscan, libpcap, zstd, and torsocks, which are used to beacon information about the infected system to the C&C server. The attackers also modify the system's SSH configuration to set up remote access by enabling root login and adding an attacker-controlled SSH key into the ~/.ssh/authorized_keys file.

    The attack vector is part of a growing trend of cyber attacks that target misconfigured or poorly secured cloud environments for cryptojacking purposes. To protect against such attacks, it is essential to ensure proper Docker API configuration, keep software up-to-date, and implement robust security measures to prevent container escape.

    In conclusion, the exploitation of misconfigured Docker APIs by hackers using Tor networks represents a significant threat to cloud security. It highlights the importance of following best practices for securing containerized environments and being aware of the risks associated with misconfigured APIs.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Hackers-Exploit-Misconfigured-Docker-APIs-to-Mine-Cryptocurrency-via-Tor-Network-A-Growing-Threat-to-Cloud-Security-ehn.shtml

  • https://thehackernews.com/2025/06/hackers-exploit-misconfigured-docker.html


  • Published: Tue Jun 24 07:17:14 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us