New Cryptojacking Campaign Exploits DevOps Exposures Across Cloud Environments

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

A widespread cryptojacking campaign, dubbed JINX-0132, targets publicly accessible DevOps applications including HashiCorp Nomad, Consul, Docker API, and Gitea, a recent investigation by Wiz Threat Research has uncovered.

JINX-0132’s approach relies heavily on exploiting misconfigurations and known vulnerabilities rather than deploying traditional malware with easily detected Indicators of Compromise (IOCs). 

The attackers leverage standard, publicly available tools from platforms like GitHub—for example, using official XMRig releases for mining Monero. 

Consul and Nomad combined have thousands of exposed instances across the Internet, and filtering for cloud providers shows hundreds that are deployed in AWS, Azure, or GCP
Consul and Nomad combined have thousands of exposed instances across the Internet, and filtering for cloud providers shows hundreds that are deployed in AWS, Azure, or GCP | Source: Wiz

This off-the-shelf tactic complicates attribution and threat clustering, as the payloads are not customized and can evade common security detections.

This marks the first documented incident of misconfigured Nomad servers being actively exploited for malicious cryptocurrency mining in the wild.

Wiz data indicates that about 25% of cloud environments run at least one of these DevOps tools. Of these, 5% expose them to the internet, and 30% of the exposed instances are misconfigured, underscoring widespread vulnerability. 

Breached instances have exhibited substantial computing capabilities, often costing victims tens of thousands of dollars per month.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: