Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » SOCO404 and Koske malware target cloud services with cross-platform encryption attacks
Identity

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

userBy userJuly 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 25th, 2025Ravi LakshmananMalware/Cloud Security

Cross-Platform Cryptocurrency Attacks

Threat Hunter offers cryptocurrency miners by disclosing two different malware campaigns targeting vulnerabilities and misconceptions across cloud environments.

The Threat Activity Cluster is called Codo404 and Koske by cloud security companies Wiz and Aqua, respectively.

SOCO404 “It targets both Linux and Windows systems and deploys platform-specific malware,” said Wiz researchers Maor Dokhanian, Shahar Dorfman, and Avigayil Mechtinger. “They use masquerades to disguise malicious activities as legitimate systems processes.”

This activity refers to the fact that Payloads is embedded in fake 404 HTML pages hosted on websites built using Google sites. The fake site was then defeated by Google.

Wiz hypothesized that this campaign was previously observed after the Apache Tomcat service with weak credentials, as well as a sensitive Apache Struts and Atlassian Confluence server using SYSRV BotNet.

Cybersecurity

The latest campaign has also been found to target publicly accessible PostgreSQL instances, with attackers abusing the compromised Apache Tomcat server and hosting payloads tailored to both Linux and Windows environments. Also, hacked by attackers is a legitimate Korean transport website for the delivery of malware.

Once initial access is obtained, copying PostgreSQL…Copying from a programmatic SQL command is exploited to execute arbitrary shell commands on the host and achieve remote code execution.

“It appears that the attackers behind SOCO404 are running automatic scans of exposed services with the aim of exploiting accessible entry points,” Wiz said. “The use of a wide range of ingress tools, including Linux utilities such as Wget and Curl, and Windows-Native tools, such as Certutil and Powershell, highlight opportunistic strategies.”

In Linux Systems, Dropper Shell Script runs directly in memory, downloading and launching the next stage payload, while also overwriting logs related to Cron and WTMP, taking steps to terminate competing miners, maximize financial gains and limit forensic visibility.

The payload that runs in the next stage is a binary that contacts the external domain and acts as a minor loader (“www.fastsoco[.]TOP “) It is based on the Google site.

Windows Attack Chain utilizes commands after the first explosion to download and run Windows binaries. This is similar to a loader that embeds both Miner and Winring0.sys drivers, just like the Linux counterpart.

Additionally, the malware attempts to stop the Windows Event Log service and runs a self-exclusion command to avoid detection.

“Attackers don’t rely on a single method or an operating system, they deploy tools or techniques that can be used in the environment to cast a wide range of nets and deliver payloads,” the company said. “This flexible approach is a hallmark of a wide range of automated encryption campaigns focused on maximizing reach and sustainability across various targets.”

The discovery of SOCO404 is the discovery of Dovetails along with the emergence of a new Linux threat suspected to have been developed with the support of a large-scale language model (LLM) and suspected of propagating malware using the seemingly harmless images of pandas.

Cybersecurity

The attack starts with the exploitation of misunderstood servers such as JupyterLab and installs various scripts from two JPEG images, including a C-based RootKit, which is used to hide malicious malware-related files using LD_PRELOAD, and a shell script that will ultimately download Cryptocurrency Miners for the infected system. Both payloads are run directly in memory to avoid leaving traces on disk.

Cross-Platform Cryptocurrency Attacks

Koske’s ultimate goal is to deploy CPU and GPU-optimized cryptocurrency miners who use Host’s computational resources to mine 18 different coins, including Monero, Ravencoin, Zano, Nexa, Tari and more.

“These images are polyglot files, with malicious payloads added to the end. When downloaded, the malware extracts and runs malicious segments in memory, bypassing antivirus tools,” says Assaf Morag, a researcher at Aqua.

“This technique is not steganography, but rather an abuse of polyglot files or embedding malicious files. This technique uses a valid JPG file with malicious shellcode at the end. Only the last byte is downloaded and executed, resulting in a sly form of polyglot abuse.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe first wave of UK HAR1 projects is set to create more than 700 jobs
Next Article The more advanced AI models we get, the more they can deceive us – they even know when they’re being tested
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

It took Google a month to shut down Catwatchful, a phone spyware operation hosted on the server

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.