🎁 12th Anniversary Celebration – Reward Distribution Notification
🎊 Congratulations to all winners! Rewards have been sent to your Gate accounts. Please check your balances
Note:
- In regions where shipping isn’t available, physical merch will be converted to equivalent vouchers — please be patient;
- If an item is out of stock, it will be substituted with merch of equal value.
🚀 Thank you for your support! Stay tuned for more exciting events
Privacy Coin Dero suffers from a new type of self-propagating malware attack, with over 520 Docker APIs exposed worldwide.
On May 29, Coindesk reported that a new type of Linux malware is attacking unprotected Docker infrastructure across the globe, transforming exposed servers into a decentralized network for mining privacy coin Dero. The malware exploits the exposed Docker API via a port 2375 attack, deploying two Golang-based implants, one disguised as legitimate web server software 'nginx' and the other named 'cloud' for mining.
Infected nodes autonomously scan the internet for new targets and deploy infected containers, eliminating the need for a central control server. As of early May, more than 520 Docker APIs around the world were publicly exposed via port 2375 and were potential targets. The study revealed that the attack used the same wallet and node infrastructure as the attacks against Kubernetes clusters in 2023 and 2024.