Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » More than 1500 PostgreSQL servers have compromised in Cryptocurrency Mining Company
Global Security

More than 1500 PostgreSQL servers have compromised in Cryptocurrency Mining Company

AdminBy AdminApril 1, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


01 April 2025Red LakshmananCrypto -Hockey / Security Cloud

Open PostgreSQL specimens are the goal of a current company designed to obtain unauthorized access and deploying cryptocurrency miners.

Wiz Wiz Cloud Security said the activity is a penetration recruitment that was first indicated by Aqua Security in August 2024 Pg_mem. The company was related to the “Wizard” track, which threatens as Jinx-0126.

“Since then, the actor threatens developed, introducing the methods of evading protection, such as the deployment of binary files with a unique hash on the target and performing a useful miner load, probably evading (platform Cloud Worker loads), which rely solely on the reputation of Hash Tikok – Note.

Cybersecurity

Wiz also showed that the company probably stated that there are more than 1500 victims today, which indicates that accidentally laid out general educational copies with weak or predictable powers are quite common to become a target for a conjunctural threatening attack.

The most distinctive aspect of the company is the abuse of a copy … from the SQL team program to perform arbitrary shell on the host.

The access provided by the successful operation of the poorly customized PostgreSQL services is used to conduct pre -exploration and reduce the useful load on the basic 64, which in reality is the script of the shell, which kills the competing mines of cryptocurrencies and throws binary called PG_Core.

Also loaded on the server – is a clouded binary code that is in Golang which imitated Legisted PostgreSQL database server. It is designed to create perseverance on the host, using the work of Cron, create a new role with high privileges and write another binary called CPU_HU on the disk.

Cybersecurity

CPU_HU, on its part, uploads the latest version Xmig mines from gitHub and launches it without it without known technology called Linux called Memfd.

“The threat actor assigns to every sacrifice of unique prey,” the visas said, adding that he has identified three different wallets related to the actor. “Each wallet had approximately 550 workers. Together, it suggests that the company could use more than 1500 compromised machines.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.