Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape
/Incidents
Incidents
/
Kinsing targeting cloud servers

Kinsing targeting cloud servers

Type
Campaign
Actors
👑Kinsing operator
Pub. date
May 16, 2024
Initial access
1-day vulnerability
Impact
Resource hijacking
Observed techniques
Vulnerability exploitation
Observed tools
XMRig
Targeted technologies
Apache Tomcat
References
https://www.tenable.com/blog/kinsing-malware-hides-itself-as-a-manual-page-and-targets-cloud-servers
Status
Finalized
Last edited
Jun 2, 2024 8:02 AM

Researchers observed recent activities surrounding the Kinsing malware, which primarily targets Linux-based cloud infrastructure. Kinsing exploits various vulnerabilities to gain unauthorized access and deploys backdoors and cryptominers. Recent findings show that Kinsing also targets Apache Tomcat servers and uses innovative techniques to remain hidden within the filesystem, increasing the difficulty of detection.

Kinsing malware campaigns exploit vulnerabilities in containers and servers to deploy backdoors and cryptominers. In recent activity, researchers observed the campaign targeting Apache Tomcat. The malware hides in unconventional filesystem locations to avoid detection, such as:

  • /var/cache/man/cs/cat1/: Typically used for user-level commands.
  • /var/cache/man/cs/cat3/: Associated with library functions.
  • /var/lib/gssproxy/rcache/: Related to the Kerberos authentication service.
  • /var/cache/man/zh_TW/cat8/: Used for system administration commands.

These locations help the malware blend in with legitimate system files. The malicious file detected includes XMRig, an open-source software used for mining Monero cryptocurrency. This particular attack on Tomcat servers has been ongoing since mid-2023.

Made with 💙 by Wiz

Last Updated: April 3, 2025