🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
Hackers Exploit Apache Flaw To Drop Linuxsys Cryptominer Payload
HomeNews* Researchers uncovered a new attack exploiting a known vulnerability in Apache HTTP Server to deploy the Linuxsys cryptocurrency miner.
The shell script automates the installation process and drops another script, “cron.sh,” which ensures the miner launches every time the system reboots. VulnCheck observed that some of the compromised sites also contain Windows malware files, indicating the campaign’s reach may extend beyond Linux systems. Attackers have previously exploited critical vulnerabilities, such as a flaw in OSGeo GeoServer GeoTools (CVE-2024-36401), for similar mining activities. Comments within the malware source code are written in Sundanese, suggesting a connection to Indonesia.
Other software vulnerabilities used in past attacks to deploy the miner include template injection in Atlassian Confluence (CVE-2023-22527), command injection in Chamilo LMS (CVE-2023-34960), and similar flaws in Metabase and Palo Alto firewalls (CVE-2024-0012 and CVE-2024-9474). “All of this indicates that the attacker has been conducting a long-term campaign, employing consistent techniques such as n-day exploitation, staging content on compromised hosts, and coin mining on victim machines,” VulnCheck reported.
In a separate incident, Kaspersky warned of a targeted attack against government servers in Asia through a custom malware called GhostContainer. The attackers may have exploited a remote code execution bug (CVE-2020-0688) in Microsoft Exchange Servers. This backdoor allows full access to compromised servers without connecting to external command centers, hiding instructions inside normal web requests, which increases stealth.
The campaigns demonstrate persistent targeting of publicly known software flaws and sophisticated tactics to maintain a low profile while carrying out mining and espionage operations.
Previous Articles: