"Jupyter Notebooks Targeted by Cryptojackers"

Researchers have discovered that cryptojackers are targeting exposed Jupyter Notebooks to install cryptocurrency miners and steal credential files for popular cloud services. Jupyter is a service that enables users to host individual code snippets and lets others execute this code in an isolated environment. According to Matt Muir, Threat Research Lead at Cado Security, a Jupyter Notebook refers to an instance of the Jupyter web application where a user would define the code to be run and how it is presented. Jupyter Notebooks can be implemented by organizations on-premises or remote servers but are also usually deployed in cloud environments as managed services. However, Notebooks to which access has not been restricted, for example, by requiring initial authentication, can be discovered and accessed by anyone with Internet access. This article continues to discuss the targeting of Jupyter Notebooks by cryptojackers.

Help Net Security reports "Jupyter Notebooks Targeted by Cryptojackers"

Submitted by grigby1
 

Submitted by grigby1 CPVI on