Public DevOps Tools targeted by criminals to steal cryptography


  • Wiz safety researchers find four main devops abused tools
  • Configuration errors allow threat actors to deploy cryptocurrency minors
  • A quarter of all the instances are in danger, so users must be on their guard

Cybercriminals have been identified by abusing configuration errors in popular tools of public devops to deploy cryptocurrency minors – generating precious tokens, while reducing huge electricity and computer invoices for their victims.

Wiz Threat Research security researchers spotted the campaign and attributed it to a threat actor appointed Jinx-0132.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top