Security researchers found cybercriminals exploiting misconfigurations in popular public DevOps tools to deploy cryptocurrency miners.
The campaign was attributed to a threat actor named JINX-0132, targeting DevOps tools like Nomad, Consul, Docker Engine API, and Gitea.
Approximately a quarter of all cloud environments are running at least one of the vulnerable technologies, with 20% running HashiCorp Consul.
To mitigate risks, companies are advised to implement strict access controls, conduct security audits, apply patches promptly, monitor systems for unusual activity, and strengthen authentication measures.