Further reading
Refer to the following links for more information on the topics covered in this chapter:
- The Tesla crypto-mining attack: https://redlock.io/blog/cryptojacking-tesla
- The crypto-worm attack: https://unit42.paloaltonetworks.com/graboid-first-ever-cryptojacking-worm-found-in-images-on-docker-hub/
- Prometheus: https://prometheus.io/docs/introduction/overview/
- Falco: https://falco.org/docs/
- The VirusTotal API: https://developers.virustotal.com/v3.0/reference
- The crypto-mining attack analysis: https://kromtech.com/blog/security-center/cryptojacking-invades-cloud-how-modern-containerization-trend-is-exploited-by-attackers
- Hubble: https://github.com/cilium/hubble