Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach
Malware and Vulnerabilities
October 25, 2024
Trend Micro
Threat actors are targeting Docker remote API servers to deploy SRBMiner crypto miners on compromised instances, according to Trend Micro. The attackers use the gRPC protocol via h2c to bypass security and manipulate Docker functionalities.
Read More
Docker Remote API Servers
SRBMiner cryptominer
Cryptomining Attacks
HTTP/2
gRPC protocol
Publisher
Previous
NVIDIA Patches Multi Vulnerabilities in Windows and Lin ...
Malware and Vulnerabilities
Next
Samsung Zero-Day Flaw Actively Exploited in the Wild
Malware and Vulnerabilities