Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Cryptojacking Commando Cat Strikes: How Misconfigured Docker Servers Are Being Hijacked for Monero Mining
A new cryptojacking campaign, dubbed “Commando Cat,” is targeting poorly-secured Docker remote API servers. This feline fiend uses Docker images to deploy cryptojacking scripts, turning your computer into a sluggish, electricity-guzzling mess while it mines cryptocurrency.

Hot Take:
Looks like the Commando Cat is out of the bag, and it’s not here to play with yarn! This feline is on a mission to hijack your CPUs faster than you can say ‘docker run.’
Key Points:
- Commando Cat campaign targets poorly-secured Docker remote API servers.
- Uses a Docker image that exploits the chroot command to access the host OS.
- Deploys ZiggyStarTux, an IRC bot built on the Kaiten malware.
- Aims to mine cryptocurrency, usually Monero, by using compromised systems.
- Results in slowed performance and increased electricity bills for victims.