• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Marketing campaign

Admin by Admin
April 1, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Apr 01, 2025Ravie LakshmananCryptojacking / Cloud Safety

Uncovered PostgreSQL cases are the goal of an ongoing marketing campaign designed to realize unauthorized entry and deploy cryptocurrency miners.

Cloud safety agency Wiz stated the exercise is a variant of an intrusion set that was first flagged by Aqua Safety in August 2024 that concerned using a malware pressure dubbed PG_MEM. The marketing campaign has been attributed to a menace actor Wiz tracks as JINX-0126.

“The menace actor has since developed, implementing protection evasion methods akin to deploying binaries with a novel hash per goal and executing the miner payload filelessly – more likely to evade detection by [cloud workload protection platform] options that rely solely on file hash fame,” researchers Avigayil Mechtinger, Yaara Shriki, and Gili Tikochinski stated.

Cybersecurity

Wiz has additionally revealed that the marketing campaign has doubtless claimed over 1,500 victims to this point, indicating that publicly-exposed PostgreSQL cases with weak or predictable credentials are prevalent sufficient to grow to be an assault goal for opportunistic menace actors.

Essentially the most distinctive facet of the marketing campaign is the abuse of the COPY … FROM PROGRAM SQL command to execute arbitrary shell instructions on the host.

The entry afforded by the profitable exploitation of weakly configured PostgreSQL companies is used to conduct preliminary reconnaissance and drop a Base64-encoded payload, which, in actuality, is a shell script that kills competing cryptocurrency miners and drops a binary named PG_CORE.

Additionally downloaded to the server is an obfuscated Golang binary codenamed postmaster that mimics the authentic PostgreSQL multi-user database server. It is designed to arrange persistence on the host utilizing a cron job, create a brand new position with elevated privileges, and write one other binary known as cpu_hu to disk.

Cybersecurity

cpu_hu, for its half, downloads the most recent model of the XMRig miner from GitHub and launches it filelessly through a identified Linux fileless approach known as memfd.

“The menace actor is assigning a novel mining employee to every sufferer,” Wiz stated, including it recognized three completely different wallets linked to the menace actor. “Every pockets had roughly 550 employees. Mixed, this implies that the marketing campaign may have leveraged over 1,500 compromised machines.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.



Tags: CampaignCompromisedCryptocurrencyFilelessMiningPostgreSQLServers
Admin

Admin

Next Post
Plex Rolls Out Up to date Cellular App

Plex Rolls Out Up to date Cellular App

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Assaults on the training sector are surging: How can cyber-defenders reply?

How MDR can tip the stability in favor of faculties

March 10, 2026
Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Safety

Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Safety

September 24, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

Design Has By no means Been Extra Vital: Inside Shopify’s Acquisition of Molly

September 8, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Crimson Desert launch time in your time zone

Crimson Desert launch time in your time zone

March 18, 2026
Kalshi’s authorized troubles pile up, as Arizona information first ever legal prices over ‘unlawful playing enterprise’

Kalshi’s authorized troubles pile up, as Arizona information first ever legal prices over ‘unlawful playing enterprise’

March 18, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved