{"id":237,"date":"2024-03-06T17:13:30","date_gmt":"2024-03-06T17:13:30","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/06\/hackers-exploit-misconfigured-yarn-docker-confluence-redis-servers-for-crypto-mining\/"},"modified":"2024-03-06T17:13:30","modified_gmt":"2024-03-06T17:13:30","slug":"hackers-exploit-misconfigured-yarn-docker-confluence-redis-servers-for-crypto-mining","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/06\/hackers-exploit-misconfigured-yarn-docker-confluence-redis-servers-for-crypto-mining\/","title":{"rendered":"Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining"},"content":{"rendered":"<p>\u200bThreat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed to deliver a cryptocurrency miner and spawn a reverse shell for persistent remote access.<br \/>\n\u201cThe attackers leverage these tools to issue exploit code, taking advantage of common misconfigurations and\u00a0Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed to deliver a cryptocurrency miner and spawn a reverse shell for persistent remote access.<br \/>\n\u201cThe attackers leverage these tools to issue exploit code, taking advantage of common misconfigurations and\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an emerging malware campaign designed to deliver a cryptocurrency miner and spawn a reverse shell for persistent remote access. \u201cThe attackers leverage these tools to issue exploit code, taking advantage of common misconfigurations and\u00a0Threat&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/06\/hackers-exploit-misconfigured-yarn-docker-confluence-redis-servers-for-crypto-mining\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":238,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/237"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/237\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/238"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}