Attackers exploit exposed Docker APIs to deploy cryptojackers and scan for more targets The malware installs persistence tools, includes inactive code for Telnet and Chrome port attacks, and may ...