Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining