🎉 The #CandyDrop Futures Challenge is live — join now to share a 6 BTC prize pool!
📢 Post your futures trading experience on Gate Square with the event hashtag — $25 × 20 rewards are waiting!
🎁 $500 in futures trial vouchers up for grabs — 20 standout posts will win!
📅 Event Period: August 1, 2025, 15:00 – August 15, 2025, 19:00 (UTC+8)
👉 Event Link: https://www.gate.com/candy-drop/detail/BTC-98
Dare to trade. Dare to win.
Hackers Exploit Apache Flaw To Drop Linuxsys Cryptominer Payload
HomeNews* Researchers uncovered a new attack exploiting a known vulnerability in Apache HTTP Server to deploy the Linuxsys cryptocurrency miner.
The shell script automates the installation process and drops another script, “cron.sh,” which ensures the miner launches every time the system reboots. VulnCheck observed that some of the compromised sites also contain Windows malware files, indicating the campaign’s reach may extend beyond Linux systems. Attackers have previously exploited critical vulnerabilities, such as a flaw in OSGeo GeoServer GeoTools (CVE-2024-36401), for similar mining activities. Comments within the malware source code are written in Sundanese, suggesting a connection to Indonesia.
Other software vulnerabilities used in past attacks to deploy the miner include template injection in Atlassian Confluence (CVE-2023-22527), command injection in Chamilo LMS (CVE-2023-34960), and similar flaws in Metabase and Palo Alto firewalls (CVE-2024-0012 and CVE-2024-9474). “All of this indicates that the attacker has been conducting a long-term campaign, employing consistent techniques such as n-day exploitation, staging content on compromised hosts, and coin mining on victim machines,” VulnCheck reported.
In a separate incident, Kaspersky warned of a targeted attack against government servers in Asia through a custom malware called GhostContainer. The attackers may have exploited a remote code execution bug (CVE-2020-0688) in Microsoft Exchange Servers. This backdoor allows full access to compromised servers without connecting to external command centers, hiding instructions inside normal web requests, which increases stealth.
The campaigns demonstrate persistent targeting of publicly known software flaws and sophisticated tactics to maintain a low profile while carrying out mining and espionage operations.
Previous Articles: