Loading cryptocurrency prices...

Soco404, Koske Malware Exploits Cloud Flaws for Crypto Mining

Cloud Malware Campaigns Exploit Server Weaknesses to Install Cryptocurrency Miners Across Linux and Windows Systems

  • Two Malware campaigns target cloud systems with cryptocurrency miners.
  • Soco404 and Koske attack both Linux and Windows using tailored malware.
  • Attackers exploit weak passwords, known software flaws, and misconfigured servers.
  • The campaigns use disguised files and fake websites to avoid detection.
  • Attackers aim to maximize mining profits by removing competitors and hiding evidence.

Threat researchers reported on July 25, 2025, that two different malware campaigns are currently targeting cloud systems to secretly install cryptocurrency mining software. The groups behind these attacks, identified as Soco404 and Koske, focus on finding and using weak spots in publicly accessible cloud servers and services.

- Advertisement -

Researchers from Wiz and Aqua explained that Soco404 uses malware that targets both Linux and Windows systems. Soco404 disguises its malicious programs as normal system processes and hides its harmful files on 404 error pages created with Google Sites. Google removed these websites after discovery.

According to Wiz, the attackers have previously targeted poorly secured Apache Tomcat, Apache Struts, and Atlassian Confluence servers. They use automated tools to scan for exposed systems and known vulnerabilities. After breaking in, they exploit features like PostgreSQL’s COPY … FROM PROGRAM SQL command to run code remotely on the server.

On Linux, the malware runs scripts in memory, terminates rival mining programs, and deletes logs to hide its traces. On Windows, a similar loader runs along with a driver that gives the attacker system-level control. The malware also tries to stop logging services and deletes itself to reduce the chance of being spotted. “Rather than relying on a single method or operating system, the attacker casts a wide net, deploying whichever tool or technique is available in the environment to deliver their payload,” Wiz stated.

The Koske attack mainly focuses on Linux systems. Researchers suspect it was partly created with help from a large language model (LLM). In this scheme, attackers use JPEG images of pandas as containers for hidden malware. These images, called polyglot files, contain both regular image data and a malicious segment at the end. When the server downloads the image, the malware code is extracted and run directly in memory.

- Advertisement -

A Koske infection starts by exploiting a misconfigured server, such as JupyterLab, and installs rootkits and mining programs. The main aim is to use the server’s resources to mine up to 18 cryptocurrencies, including Monero and Ravencoin. Aqua researcher Assaf Morag described the polyglot technique, saying, “This technique isn’t steganography but rather polyglot file abuse or malicious file embedding.” Learn more in the detailed publication.

Attackers in both campaigns remove traces of their activities, kill competing mining programs, and use creative methods to keep their operations hidden and persistent.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Dromos Labs to Launch Aero Token in 2026, Challenging Uniswap

Dromos Labs will launch the Aero protocol and token on Ethereum in the second...

Parag Agrawal’s AI Startup Raises $100M, Valued at $740 Million

Parallel Web Systems, founded by former Twitter CEO Parag Agrawal, has secured $100 million...

Crypto Fear Fuels Potential for Unexpected November Rally

Crypto market sentiment is showing extreme fear, the lowest since March, amid ongoing declines....

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...
- Advertisement -

Must Read

Symbiosis Crypto Bridge: Your Guide to Moving Assets Between Blockchains

What is a Cross-Chain Crypto Bridge?Why Choose Symbiosis for Your Cross-Chain Needs?Support for 50+ BlockchainsAutomatic Routing for the Best RatesNo Need for RegistrationDirect Wallet...