When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
When a user installs 9hits, their rig visits other members websites via a headless Chrome instance.
In exchange, the user receives credits which they can then spend to drive traffic to their own sites.
To install 9hits, the attackers must first gain access to the vulnerable Docker hosts.
But thats not all.
Monero is a popular choice for cybercriminals as its practically impossible to trace.