Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
Summary: Researchers have uncovered a new malware campaign targeting Docker environments that mines cryptocurrency using a previously unknown technique. Instead of deploying traditional miners, this campaign uses a malicious container image to connect to a decentralized network called Teneo, which rewards users for sending keep-alive pings. This shift towards alternative methods reflects a broader trend in evading detection in the cryptojacking landscape.

Affected: Docker environments, Teneo decentralized network

Keypoints :

  • Malware targets Docker environments to mine cryptocurrency without using traditional methods like XMRig.
  • The campaign utilizes the Teneo network, where users earn rewards for sending frequent “heartbeats” rather than scraping social media data.
  • Similar threats exist, such as those using 9Hits Viewer and proxyjacking, indicating a trend toward alternative monetization strategies in cryptojacking.

Source: https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html