
Name Kinsing Type of Malware Cryptominer Date of Initial Activity 2020 Motivation Cryptomining, Data theft, Denial-of-service attacks, Remote access Attack Vectors Targets misconfigured Docker Daemon API ports, Attacks vulnerable images and weakly configured PostgreSQL containers in Kubernetes, log4j exploit, Shell Scripts, Linux Based Malicious Backdoors, Rootkits, Targeted System Linux, Windows
Overview
Discovered in 2020, Kinsing is a Golang cryptominer with a rootkit component. Originally designed to exploit Linux systems, Kinsing was installed on compromised servers by abusing vulnerabilities on internet facing services.
Later in 2021 a Windows variant of the malware was developed as well, allowing the attackers to increase their attack surface.
Targets
Kinsing is often used in attacks against Docker, Redis, and SaltStack. It can also be used to target Kubernetes clusters.
Tools/ Techniques Used
Kinsing has been involved in multiple attack campaigns, including Redis and SaltStack. Kinsing Malware Exploiting Liferay Vulnerability CVE-2020-7961.
References
Threat Alert: Kinsing Malware Attacks Targeting Container Environments
Misconfigured Docker Daemon API Ports Attacked for Kinsing Malware Campaign
Connecting Kinsing malware to Citrix and SaltStack campaigns
Exposed Redis Instances Abused for Remote Code Execution, Cryptocurrency Mining
Microsoft: Kubernetes clusters hacked in malware campaign via PostgreSQL
The post Kinsing (Cryptominer) – Malware first appeared on CyberMaterial.


