The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud.
Unlike on-premises infrastructure, whereby it is difficult to scale up resources, cloud environments enable attackers to deploy resources for cryptomining rapidly, making exploitation easier.
One of the most common threats of cloud cryptomining is “Kinsing malware.”
Cybersecurity researchers recently discovered that Kinsing malware has been actively attacking the Apache Tomcat server with vulnerabilities.
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
Malware families such as Kinsing, a longstanding malware family, specialize in Linux-based cloud infrastructure and aim to gain unauthorized access by exploiting vulnerabilities.
In most cases, hackers behind Kinsing use compromised systems to install backdoors or cryptominers.
Kinsing once it infects a system, uses system resources for cryptomining, leading to increased costs and reduced server performance.
The latest findings show that the group has been attacking Apache Tomcat servers through Kinsing malware and hiding in filesystems, such as their persistence, by using any innocent file location.
These campaigns use containers and servers’ flaws to install malicious backdoors and cryptominers.
In this instance, many servers were infected simultaneously within one environment, including an Apache Tomcat server with severe vulnerabilities.
Apache Tomcat, an open-source server that publishes static content to the public, is a tempting target for Kinsing perpetrators.
To remain hidden, the Kinsing malware uses uncommon tricks to appear as a file on any system in places where one would never think of looking.
It is found in four areas and here below we have mentioned them:-
The assumption is that defenders rarely take a critical look at such locations for malicious files due to using the ‘man’ or ‘manual’ page directories and dummy locale folder, consequently making them ideal hiding spots for Kinsing.
To evade discovery, the Kinsing malware is hidden within areas where legitimate system files are usually found.
Attackers increase the chances of their malware being unnoticed on compromised systems by using such innocent-looking routes.
The detected malicious file was not new, and it was first seen in China in late 2022.
However, this specific attack on the Tomcat server began in mid-2023 with file creation dates from June to July 2023 over a year of an undetected malicious operation.
The malware uses old version 6.12.2 of XMRig cryptominer, which mines privacy-focused Monero cryptocurrency. GitHub already has the current version 6.21.2 for downloading.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…