Summary: Researchers have uncovered a new malware campaign targeting Docker environments that mines cryptocurrency using a previously unknown technique. Instead of deploying traditional miners, this campaign uses a malicious container image to connect to a decentralized network called Teneo, which rewards users for sending keep-alive pings. This shift towards alternative methods reflects a broader trend in evading detection in the cryptojacking landscape.
Affected: Docker environments, Teneo decentralized network
Keypoints :
- Malware targets Docker environments to mine cryptocurrency without using traditional methods like XMRig.
- The campaign utilizes the Teneo network, where users earn rewards for sending frequent “heartbeats” rather than scraping social media data.
- Similar threats exist, such as those using 9Hits Viewer and proxyjacking, indicating a trend toward alternative monetization strategies in cryptojacking.
Source: https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html