🎉 Hey Gate Square friends! Non-stop perks and endless excitement—our hottest posting reward events are ongoing now! The more you post, the more you win. Don’t miss your exclusive goodies! 🚀
🆘 #Gate 2025 Semi-Year Community Gala# | Square Content Creator TOP 10
Only 1 day left! Your favorite creator is one vote away from TOP 10. Interact on Square to earn Votes—boost them and enter the prize draw. Prizes: iPhone 16 Pro Max, Golden Bull sculpture, Futures Vouchers!
Details 👉 https://www.gate.com/activities/community-vote
1️⃣ #Show My Alpha Points# | Share your Alpha points & gains
Post your
Hackers Exploit Apache Flaw To Drop Linuxsys Cryptominer Payload
HomeNews* Researchers uncovered a new attack exploiting a known vulnerability in Apache HTTP Server to deploy the Linuxsys cryptocurrency miner.
The shell script automates the installation process and drops another script, “cron.sh,” which ensures the miner launches every time the system reboots. VulnCheck observed that some of the compromised sites also contain Windows malware files, indicating the campaign’s reach may extend beyond Linux systems. Attackers have previously exploited critical vulnerabilities, such as a flaw in OSGeo GeoServer GeoTools (CVE-2024-36401), for similar mining activities. Comments within the malware source code are written in Sundanese, suggesting a connection to Indonesia.
Other software vulnerabilities used in past attacks to deploy the miner include template injection in Atlassian Confluence (CVE-2023-22527), command injection in Chamilo LMS (CVE-2023-34960), and similar flaws in Metabase and Palo Alto firewalls (CVE-2024-0012 and CVE-2024-9474). “All of this indicates that the attacker has been conducting a long-term campaign, employing consistent techniques such as n-day exploitation, staging content on compromised hosts, and coin mining on victim machines,” VulnCheck reported.
In a separate incident, Kaspersky warned of a targeted attack against government servers in Asia through a custom malware called GhostContainer. The attackers may have exploited a remote code execution bug (CVE-2020-0688) in Microsoft Exchange Servers. This backdoor allows full access to compromised servers without connecting to external command centers, hiding instructions inside normal web requests, which increases stealth.
The campaigns demonstrate persistent targeting of publicly known software flaws and sophisticated tactics to maintain a low profile while carrying out mining and espionage operations.
Previous Articles: