Jun 02, 2025 • Wiz Security Research
DevOps Tools Targeted for Cryptojacking
Wiz Threat Research has uncovered a widespread cryptojacking campaign specifically targeting popular DevOps infrastructure tools, namely Nomad and Consul....
Executive Summary
Wiz Threat Research has uncovered a widespread cryptojacking campaign specifically targeting popular DevOps infrastructure tools, namely Nomad and Consul. This activity indicates a strategic shift by adversaries towards compromising cloud-native environments to illicitly mine cryptocurrency. The exploitation of these platforms suggests attackers are leveraging misconfigurations or vulnerabilities within orchestration and service discovery tools to gain execution rights. While no specific threat actor group or malware family has been publicly attributed in this initial reporting, the widespread nature of the campaign poses a significant operational risk. Organizations utilizing these DevOps applications should immediately audit their deployments for unauthorized resource usage and ensure strict access controls are enforced. Mitigation strategies include network segmentation, monitoring for anomalous CPU spikes, and patching known vulnerabilities within Nomad and Consul instances to prevent unauthorized code execution and resource hijacking attempts effectively.
Summary
The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul.
Published Analysis
Wiz Threat Research has uncovered a widespread cryptojacking campaign specifically targeting popular DevOps infrastructure tools, namely Nomad and Consul. This activity indicates a strategic shift by adversaries towards compromising cloud-native environments to illicitly mine cryptocurrency. The exploitation of these platforms suggests attackers are leveraging misconfigurations or vulnerabilities within orchestration and service discovery tools to gain execution rights. While no specific threat actor group or malware family has been publicly attributed in this initial reporting, the widespread nature of the campaign poses a significant operational risk. Organizations utilizing these DevOps applications should immediately audit their deployments for unauthorized resource usage and ensure strict access controls are enforced. Mitigation strategies include network segmentation, monitoring for anomalous CPU spikes, and patching known vulnerabilities within Nomad and Consul instances to prevent unauthorized code execution and resource hijacking attempts effectively. The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul. The Wiz Threat Research team has identified a widespread cryptojacking campaign targeting commonly used DevOps applications including Nomad and Consul.