Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
GeoServer RCE Exploited in CoinMiner Campaigns

GeoServer RCE Exploited in CoinMiner Campaigns

Type
Campaign
Actors
❓Unknown
Pub. date
December 26, 2025
Initial access
1-day vulnerabilitySoftware misconfig
Impact
Resource hijacking
Observed techniques
Vulnerability exploitationExposed resource abuse
Observed tools
CoinMinerAnyDeskXMRig
Targeted technologies
GeoServerWebLogic
References
https://asec.ahnlab.com/en/91724/
Status
Finalized
Last edited
Jan 15, 2026 1:57 PM

The activity centers on CVE-2024-36401, a remote code execution vulnerability disclosed in 2024 that allows unauthenticated attackers to execute arbitrary commands on vulnerable GeoServer instances. Since disclosure, multiple threat actors have systematically scanned for exposed and unpatched GeoServer deployments, abusing the vulnerability to execute PowerShell, Bash, and Windows-native utilities (such as certutil) to fetch and run malware.

Three distinct CoinMiner infection patterns were observed by researchers. Type A campaigns leveraged PowerShell and Bash payloads to download batch or shell scripts that ultimately installed XMRig, reusing Monero wallet addresses across both GeoServer and other exposed services such as WegLogic. Type B activity involved a more structured dropper delivered via certutil, unpacking a RAR SFX archive that installed a customized XMRig build disguised as Java binaries and executed as a Windows service via NSSM. Type C campaigns combined CoinMiner deployment with additional tooling, including AnyDesk and a custom in-memory downloader, while also attempting to disable or bypass Windows Defender to maintain long-term access.