Skip to content
NEW

Security news and analysis brought to you by the McCrary Institute

READ MORE

Docker malware exploits Teneo Web3 node to earn crypto via fake heartbeat signals

(Image by Tumisu from Pixabay)

By Ravie Lakshmanan

Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine cryptocurrency.

The activity cluster, per Darktrace and Cado Security, represents a shift from other cryptojacking campaigns that directly deploy miners like XMRig to illicitly profit off the compute resources.

This involves deploying a malware strain that connects to a nascent Web3 service called Teneo, a decentralized physical infrastructure network (DePIN) that allows users to monetize public social media data by running a Community Node in exchange for rewards called Teneo Points, which can be converted into $TENEO Tokens.

Read more at The Hacker News