Attackers Use Docker APIs, Tor Anonymity in Stealthy Crypto HeistBy rooter / June 23, 2025 The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.