Sunday, April 13, 2025
HomeCyber AttackOver 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

Over 1,500 PostgreSQL Servers Hit by Fileless Malware Attack

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy cryptomining payloads.

The attack, identified by Wiz Threat Research and attributed to the threat actor group JINX-0126, exploits publicly exposed PostgreSQL instances configured with weak or default credentials.

The attackers utilize these vulnerabilities to execute XMRig-C3 cryptominers without leaving detectable files on the system.

- Advertisement - Google News

Fileless Payloads Evade Detection

The campaign demonstrates advanced evasion tactics, including the deployment of binaries with unique hashes for each target and fileless execution of the miner payload.

These measures are designed to bypass traditional security solutions that rely on file hash reputation for detection.

The attackers also assign unique mining worker IDs to each compromised server, further complicating detection efforts.

Fileless Malware Attack
technical information about a sample sourced 

Analysis of the campaign revealed that the attackers abuse PostgreSQL’s COPY ... FROM PROGRAM function to drop and execute malicious payloads.

Upon gaining access, they perform system discovery commands such as whoami and uname, followed by deploying a dropper script that eliminates competing cryptominers and installs their own malware.

Technical Details of the Attack

The malware includes a binary named “postmaster,” which mimics legitimate PostgreSQL processes to avoid suspicion.

This binary is packed with obfuscation techniques and encrypted configurations, ensuring its persistence on infected systems.

It creates cron jobs for regular execution and modifies PostgreSQL configuration files to block external access while maintaining communication with internal networks.

Additionally, a secondary binary named “cpu_hu” is deployed to execute cryptomining operations.

This binary operates filelessly via memory-based execution, further reducing its footprint on the compromised systems.

Both binaries are tailored per victim, with unique configurations embedded in their code to ensure operational efficiency and evade detection.

Widespread Impact Across Cloud Environments

The campaign highlights the widespread vulnerability of cloud-hosted PostgreSQL instances.

Wiz’s research indicates that nearly 90% of cloud environments host PostgreSQL databases, with approximately one-third of these being publicly exposed.

This misconfiguration provides an easy entry point for opportunistic attackers like JINX-0126.

By analyzing wallets associated with the campaign on C3Pool, researchers estimated that each wallet had approximately 550 active mining workers, confirming the scale of the attack across more than 1,500 servers globally.

According to the Report, To counter such threats, organizations must ensure robust security configurations for their PostgreSQL instances, including disabling public exposure and enforcing strong authentication mechanisms.

Tools like Wiz Dynamic Scanner can identify exposed instances and detect weak credentials within cloud environments.

Additionally, runtime sensors can monitor for suspicious activities indicative of such attacks, from initial exploitation to fileless cryptomining operations.

This incident underscores the critical need for proactive database security measures in cloud environments to prevent exploitation by increasingly sophisticated threat actors.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...