CrowdStrike has uncovered a cryptojacking campaign dubbed "Kiss-a-dog," which targets vulnerable Docker and Kubernetes infrastructure by using an obscure domain and various techniques to mine cryptocurrency while evading detection. The campaign involves container escape, removal of cloud monitoring services, and the use of traditional kernel rootkits like Diamorphine and Libprocesshider to hide malicious activity. Attackers employ popular mining software like XMRig, disguised as legitimate processes, and utilize anonymous pool servers to conceal wallet addresses. Additionally, they leverage network-scanning tools to seek out more vulnerable instances and use Redis as a backdoor for further exploitation. This campaign highlights the persistent threat to cloud environments, emphasizing the need for robust security measures like those provided by CrowdStrike's Falcon platform, which offers both agentless and agent-based capabilities to detect and prevent such breaches.