By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Crypto-Jacking Attacks Target DevOps and AI Infrastructure
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > New Crypto-Jacking Attacks Target DevOps and AI Infrastructure
News

New Crypto-Jacking Attacks Target DevOps and AI Infrastructure

News Room
Last updated: 2025/06/24 at 4:59 AM
News Room Published 24 June 2025
Share
SHARE

Security researchers at Wiz have uncovered a sophisticated crypto-jacking attack targeting publically accessible API servers for several popular DevOps tools. Similarly, researchers at Sysdig have uncovered an attack on the popular AI tool Open WebUI using many of the same techniques and crypto-miners.

Wiz Threat Research writes about how the threat actor, designated JINX-0132, has systematically compromised exposed instances of Nomad, Consul, Docker, and Gitea applications to deploy cryptocurrency mining software. The attack appears to escalate cryptojacking tactics, with attackers deliberately avoiding traditional attack signatures that security teams typically monitor. “A key characteristic of JINX-0132’s methodology is the seemingly deliberate avoidance of any unique, traditional identifiers that could be used by defenders as Indicators of Compromise,” explained researchers Gili Tikochinski, Danielle Aminov, and Merav Bar from Wiz Threat Research. “Instead of utilising attacker-controlled servers for payload delivery, they download tools directly from public GitHub repositories.”

A separate but related incident analysed by Sysdig researchers demonstrates how AI infrastructure has also become a target for crypto-jacking operations. The Sysdig Threat Research Team recently observed an attacker exploiting a misconfigured Open WebUI instance, a popular self-hosted AI interface with 95,000 GitHub stars. “Open WebUI was mistakenly exposed to the internet while also being configured to allow administrator access,” explained researchers Miguel Hernandez and Alessandra Rizzo from Sysdig. The attackers uploaded a malicious AI-generated Python script through Open WebUI’s plugin system, which then downloaded T-Rex and XMRig crypto-miners alongside sophisticated defence evasion tools.

Open WebUI servers found connected to the Internet, image courtesy of Sysdig

The research reveals that cryptojacking attacks have evolved significantly beyond traditional methods. Whilst many campaigns still rely on email phishing and malicious links that automatically download crypto-mining software which are often embedded in JavaScript, this attack specifically targets infrastructure misconfiguration to install well-known open-source software. This “living-off-open-source” approach makes detection particularly challenging for cybersecurity teams, as the attackers use legitimate, publically available tools rather than custom malware. The threat actors deploy standard release versions of the XMRig cryptocurrency mining software, which connects to public Monero crypto mining pools and is monetised through a wallet controlled by the attacker.

The Wiz report notes that the scale of compromised infrastructure is startling, with some affected Nomad instances managing hundreds of clients with combined computing resources that would cost tens of thousands of pounds monthly. The campaign highlights how even well-funded organisations can be vulnerable to basic security misconfigurations. Sysdig’s analysis revealed that over 17,000 Open WebUI instances are currently exposed to the internet, highlighting the widespread risk of misconfigured AI tools.

Going into detail on the attack vectors used for each platform, the researchers explain how HashiCorp Nomad, a container orchestration platform, allows any user with API access to create and execute jobs, effectively providing remote code execution capabilities if not correctly locked down. The attackers exploit this default behaviour to submit malicious jobs with random service names, though they consistently use offensive language for task group definitions. In HashiCorp Consul deployments, attackers abuse the service health check functionality to execute arbitrary commands. Docker API instances, when exposed without authentication, provide attackers with root-level access to create containers and mount host filesystems. Gitea instances become vulnerable through various attack vectors, including post-authentication remote code execution vulnerabilities, unlocked installation wizards, and misconfigurations in git hook permissions.

According to Wiz data, approximately 25% of cloud environments run at least one of the targeted technologies, with HashiCorp Consul being the most prevalent in over 20% of environments. Amongst organisations using these tools, 5% expose them directly to the internet, and 30% of those exposed deployments contain security misconfigurations that could enable similar attacks.

XMRig has become the cryptocurrency miner of choice for numerous attacks targeting other widely used infrastructure tools. The recent RedisRaider attack has exploited internet-exposed Redis servers to deploy XMRig, using custom scanning logic to identify vulnerable instances before injecting cron jobs to maintain persistence, whilst the Commando Cat attack also focused on exposed Docker API endpoints similarly to JINX-0132. Kubernetes instances have also been compromised through attacks that create actor-controlled GitHub accounts with repositories containing GitHub Actions to run mining operations, and in 2021 GitHub changed the behaviour of GitHub Actions to prevent these crypto-jacking attacks. Attackers have also exploited popular CI/CD platform Jenkins through various methods, including the JenkinsMiner campaign, and more recent attacks that weaponise the Jenkins Script Console for cryptomining activity if it’s not configured properly.

The article concludes by explaining how organisations can defend against these attacks, mainly by implementing proper access controls and authentication. For Nomad deployments, enabling Access Control Lists (ACLs) would prevent unauthorised job execution. Consul instances should disable script checks and restrict HTTP API access to localhost where possible. Docker APIs should never be exposed to the internet without proper authentication, and Gitea instances require regular updates and careful configuration of git hook permissions.

Writing on LinkedIn, a poster from from Matrix Sec Cyber Security summarises the issue:

The speed and flexibility DevOps provides can be a huge competitive advantage — but only when paired with strong security hygiene. Campaigns like JINX-0132 show that attackers aren’t necessarily using bleeding-edge exploits. They’re using our own missteps — and our own tools — against us.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Chinese GPU maker MetaX completes IPO counseling · TechNode
Next Article Closed-Loop Marketing: How It Elevates Your Social Media ROI
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Four critical questions (and expert answers) about Trump’s new critical minerals executive order
News
China’s BYD, Xpeng, and GAC to source Nvidia’s next-gen AI Chip ‘Thor’ · TechNode
Computing
This Amex Card's New Welcome Offer Has Me Scratching My Head. Here's Why
News
The European Parliament has taken a step to shield free hand luggage on flights. It is not the plan that supports the 27
Mobile

You Might also Like

News

Four critical questions (and expert answers) about Trump’s new critical minerals executive order

11 Min Read
News

This Amex Card's New Welcome Offer Has Me Scratching My Head. Here's Why

5 Min Read
News

This 55-inch QLED TV is on sale for $565 and looks like a picture frame

2 Min Read
News

India’s GoKwik raised a small $13M round for a hefty leap in valuation | News

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?