Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
👑

Kinsing operator

Tags
Cryptojacking
Attribution
💰Cybercrime
Incidents
Kinsing campaigns (2020)Kinsing targeting cloud serversKinsing campaigns (2023-2024)
References
https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerabilityhttps://blog.aquasec.com/loony-tunables-vulnerability-exploited-by-kinsing
Last edited
Jun 2, 2024 10:19 AM
Status
Finalized
Cloud-fluent
Unique Tools
Kinsing

The primary motivation behind Kinsing malware is financial gain through illicit cryptomining (cryptojacking). By leveraging the resources of compromised systems, the attackers mine cryptocurrencies, particularly Monero, due to its privacy features and CPU-mining suitability.

The group demonstrates a high level of technical expertise in exploiting vulnerabilities within cloud and container environments. They are proficient in identifying and exploiting security flaws in widely used applications and services such as Oracle WebLogic, Apache Struts, and Kubernetes.

Despite ongoing efforts by the cybersecurity community to track and attribute their activities, the attackers maintain a high level of anonymity and operational security, making definitive identification challenging.

Made with 💙 by Wiz

Last Updated: April 3, 2025