Soco404, Koske Malware Exploits Cloud Flaws for Crypto Mining

Cloud Malware Campaigns Exploit Server Weaknesses to Install Cryptocurrency Miners Across Linux and Windows Systems

  • Two Malware campaigns target cloud systems with cryptocurrency miners.
  • Soco404 and Koske attack both Linux and Windows using tailored malware.
  • Attackers exploit weak passwords, known software flaws, and misconfigured servers.
  • The campaigns use disguised files and fake websites to avoid detection.
  • Attackers aim to maximize mining profits by removing competitors and hiding evidence.

Threat researchers reported on July 25, 2025, that two different malware campaigns are currently targeting cloud systems to secretly install cryptocurrency mining software. The groups behind these attacks, identified as Soco404 and Koske, focus on finding and using weak spots in publicly accessible cloud servers and services.

- Advertisement -

Researchers from Wiz and Aqua explained that Soco404 uses malware that targets both Linux and Windows systems. Soco404 disguises its malicious programs as normal system processes and hides its harmful files on 404 error pages created with Google Sites. Google removed these websites after discovery.

According to Wiz, the attackers have previously targeted poorly secured Apache Tomcat, Apache Struts, and Atlassian Confluence servers. They use automated tools to scan for exposed systems and known vulnerabilities. After breaking in, they exploit features like PostgreSQL’s COPY … FROM PROGRAM SQL command to run code remotely on the server.

On Linux, the malware runs scripts in memory, terminates rival mining programs, and deletes logs to hide its traces. On Windows, a similar loader runs along with a driver that gives the attacker system-level control. The malware also tries to stop logging services and deletes itself to reduce the chance of being spotted. “Rather than relying on a single method or operating system, the attacker casts a wide net, deploying whichever tool or technique is available in the environment to deliver their payload,” Wiz stated.

The Koske attack mainly focuses on Linux systems. Researchers suspect it was partly created with help from a large language model (LLM). In this scheme, attackers use JPEG images of pandas as containers for hidden malware. These images, called polyglot files, contain both regular image data and a malicious segment at the end. When the server downloads the image, the malware code is extracted and run directly in memory.

A Koske infection starts by exploiting a misconfigured server, such as JupyterLab, and installs rootkits and mining programs. The main aim is to use the server’s resources to mine up to 18 cryptocurrencies, including Monero and Ravencoin. Aqua researcher Assaf Morag described the polyglot technique, saying, “This technique isn’t steganography but rather polyglot file abuse or malicious file embedding.” Learn more in the detailed publication.

Attackers in both campaigns remove traces of their activities, kill competing mining programs, and use creative methods to keep their operations hidden and persistent.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ether’s Social Hype Signals Caution Amid 50% Rally, Says Santiment

Social media activity linked to Ethereum (ETH) has reached levels that could indicate a...

Prosecutors Weigh Charges Against Dragonfly Over Tornado Cash Ties

U.S. prosecutors are considering charges against Dragonfly Capital over its investment in Tornado Cash’s...

Prosecutors Weigh Charges Against Dragonfly Capital Over Tornado Cash

Prosecutors in New York said they may file criminal charges against employees at Dragonfly...

US, UK Employees Risk Data Leaks Using Chinese GenAI Tools, Study Finds

Employee use of Chinese generative AI tools in the US and UK is widespread...

Chris Larsen Sells $175M XRP, Sparks Centralization Concerns

Chris Larsen, Ripple's co-founder, transferred $175 million in XRP during a recent price rally,...

Must Read

Top 10 Best Crypto Faucets To Earn Free Crypto

Are you looking to earn free cryptocurrency? Look no further! In this article, we will introduce you to the top 10 best crypto faucets...