Soco404, Koske Malware Exploits Cloud Flaws for Crypto Mining

Cloud Malware Campaigns Exploit Server Weaknesses to Install Cryptocurrency Miners Across Linux and Windows Systems

  • Two Malware campaigns target cloud systems with cryptocurrency miners.
  • Soco404 and Koske attack both Linux and Windows using tailored malware.
  • Attackers exploit weak passwords, known software flaws, and misconfigured servers.
  • The campaigns use disguised files and fake websites to avoid detection.
  • Attackers aim to maximize mining profits by removing competitors and hiding evidence.

Threat researchers reported on July 25, 2025, that two different malware campaigns are currently targeting cloud systems to secretly install cryptocurrency mining software. The groups behind these attacks, identified as Soco404 and Koske, focus on finding and using weak spots in publicly accessible cloud servers and services.

- Advertisement -

Researchers from Wiz and Aqua explained that Soco404 uses malware that targets both Linux and Windows systems. Soco404 disguises its malicious programs as normal system processes and hides its harmful files on 404 error pages created with Google Sites. Google removed these websites after discovery.

According to Wiz, the attackers have previously targeted poorly secured Apache Tomcat, Apache Struts, and Atlassian Confluence servers. They use automated tools to scan for exposed systems and known vulnerabilities. After breaking in, they exploit features like PostgreSQL’s COPY … FROM PROGRAM SQL command to run code remotely on the server.

On Linux, the malware runs scripts in memory, terminates rival mining programs, and deletes logs to hide its traces. On Windows, a similar loader runs along with a driver that gives the attacker system-level control. The malware also tries to stop logging services and deletes itself to reduce the chance of being spotted. “Rather than relying on a single method or operating system, the attacker casts a wide net, deploying whichever tool or technique is available in the environment to deliver their payload,” Wiz stated.

The Koske attack mainly focuses on Linux systems. Researchers suspect it was partly created with help from a large language model (LLM). In this scheme, attackers use JPEG images of pandas as containers for hidden malware. These images, called polyglot files, contain both regular image data and a malicious segment at the end. When the server downloads the image, the malware code is extracted and run directly in memory.

- Advertisement -

A Koske infection starts by exploiting a misconfigured server, such as JupyterLab, and installs rootkits and mining programs. The main aim is to use the server’s resources to mine up to 18 cryptocurrencies, including Monero and Ravencoin. Aqua researcher Assaf Morag described the polyglot technique, saying, “This technique isn’t steganography but rather polyglot file abuse or malicious file embedding.” Learn more in the detailed publication.

Attackers in both campaigns remove traces of their activities, kill competing mining programs, and use creative methods to keep their operations hidden and persistent.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Ether Traders Hedge as War, Macro Risks Pressure Price

Ether's price fell 6% from $2,200 on Wednesday, caught in a risk-off shift due...

Original Penguin Sues Pudgy Penguins Over Trademark

PEI Licensing, operator of the Original Penguin brand, is suing the Pudgy Penguins crypto...

Crypto team drafted for war in Iran? $80k lost

The Montra Finance A.I. project announced its team was drafted for the U.S.-Israel war,...

38% of Altcoins Near All-Time Lows: Analyst

An estimated 38% of altcoins are now trading near historic lows, a worse situation...

ADA Now Accepted at 137 Swiss Spar Stores

Cardano's ADA token is now a live payment option across 137 Spar supermarkets in...

Must Read

Forex Trading Vs Crypto Trading: Which One Should You Choose?

So you're trying to decide between two types of trading: Forex and cryptocurrency.Forex trading is the big player in the trading world, with lots...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!