Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025
Reading Time: 2 mins read
in Alerts
DevOps Servers Hit By JINX0132 Crypto Mine

A new cryptojacking campaign is actively targeting publicly accessible DevOps web servers like Docker, Gitea, and HashiCorp Consul and Nomad. Cloud security firm Wiz is tracking this widespread activity under the name JINX-0132, reporting that attackers exploit known misconfigurations. They also leverage various vulnerabilities to successfully deliver their cryptocurrency miner payload to the compromised systems. This campaign notably marks the first publicly documented instance where Nomad misconfigurations are being exploited as an active attack vector. These types of overlooked misconfigurations often go unnoticed by security defenders, especially when the involved tools are not widely seen as likely targets.

What further distinguishes these ongoing attacks is that the bad actors download necessary tools directly from public GitHub repositories. They deliberately avoid using their own infrastructure for any staging purposes, which is a common tactic for other groups. The use of such readily available off-the-shelf tools is seen as a deliberate attempt by JINX-0132. This specific methodology aims to significantly cloud attribution efforts and make it harder to track their malicious activities. Some of the compromised Nomad instances were found to manage hundreds of clients, highlighting the potential scale and compute power. This stolen compute power then directly drives the illicit cryptojacking activity, generating profit for the attackers.

The JINX-0132 threat actors are also taking advantage of vulnerabilities or misconfigurations in Gitea, a lightweight open-source Git solution. Publicly exposed Gitea instances can be vulnerable to remote code execution if certain conditions are met by the attackers. Similarly, HashiCorp Consul could allow arbitrary code execution if the system is not properly configured by its administrators. JINX-0132 abused this Consul capability to add malicious health checks that, in practice, simply execute their mining software. They have also been observed exploiting misconfigurations in publicly-exposed Nomad server APIs to create multiple new jobs on compromised hosts.

These jobs are then responsible for downloading the XMRig miner payload from GitHub and subsequently executing it.

This concerning disclosure arrives as Sysdig has also revealed details of a separate malware campaign targeting both Linux and Windows systems. That campaign exploits misconfigured systems hosting Open WebUI to upload an AI-generated Python script for malicious purposes. This script ultimately delivers cryptocurrency miners like T-Rex and XMRig, creates systemd services for persistence, and utilizes Discord webhooks. The widespread exposure of DevOps tools presents a significant risk, with Shodan data showing thousands of exposed Consul and Nomad servers. Many of these exposed instances are hosted on major cloud platforms, indicating a broad attack surface for such cryptojacking campaigns globally.

Reference:

  • JINX0132 Botnet Turns DevOps Tools Into Crypto Miners Via Known Flaws
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityJune 2025
ADVERTISEMENT

Related Posts

New Malware Uses Prompts To Trick AI Tools

Fake Job Offers Hide North Korean Malware

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Malware Uses Prompts To Trick AI Tools

June 26, 2025
New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

June 26, 2025
OneClik Malware Attacks Energy Sector Firms

Hackers Abuse Trezor Support For Phishing

June 25, 2025
OneClik Malware Attacks Energy Sector Firms

FileFix Attack Turns Explorer Into Weapon

June 25, 2025
OneClik Malware Attacks Energy Sector Firms

OneClik Malware Attacks Energy Sector Firms

June 25, 2025

Latest Alerts

Fake Job Offers Hide North Korean Malware

New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

Hackers Abuse Trezor Support For Phishing

FileFix Attack Turns Explorer Into Weapon

OneClik Malware Attacks Energy Sector Firms

Subscribe to our newsletter

    Latest Incidents

    Resupply DeFi Protocol Hacked For $9.6M

    Cyberattack Hits South Tyrol Emergency Ops

    UK’s Glasgow City Council Hit By Cyberattack

    Columbia University Probes Major IT Outage

    Mainline Health Breach Hits 101,000 Patients

    Porto Nacional City Hall Hit by Ransomware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial