Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign
A threat actor linked to a recent effort that targets unprotected Jupyter Notebooks is likely from Tunisia. The campaign aims to compromise cloud infrastructures and mine cryptocurrencies illegally.
The intrusion set, which Cado has named Qubitstrike, uses the Telegram API to exfiltrate credentials from cloud service providers after a successful attack.
According to security experts Matt Muir and Nate Bill, "the payloads for the Qubitstrike campaign are all hosted on codeberg.org – an alternative Git hosting platform, providing much of the same functionality as GitHub," which was announced on Wednesday.
The publicly available Jupyter instances are compromised in the attack chain read more Qubitstrike Targets Jupyter Notebooks with Crypto Mining and Rootkit Campaign.
Stay info...