detection

Tech Optimizer
April 2, 2025
A malware campaign has compromised over 1,500 PostgreSQL servers using fileless techniques to deploy cryptomining payloads. The attack, linked to the threat actor group JINX-0126, exploits publicly exposed PostgreSQL instances with weak or default credentials. The attackers utilize advanced evasion tactics, including unique hashes for binaries and fileless execution of the miner payload, making detection difficult. They exploit PostgreSQL’s COPY ... FROM PROGRAM function to execute malicious payloads and perform system discovery commands. The malware includes a binary named “postmaster,” which mimics legitimate processes, and a secondary binary named “cpu_hu” for cryptomining operations. Nearly 90% of cloud environments host PostgreSQL databases, with about one-third being publicly exposed, providing easy entry points for attackers. Each wallet associated with the campaign had around 550 active mining workers, indicating the extensive scale of the attack. Organizations are advised to implement strong security configurations to protect their PostgreSQL instances.
Tech Optimizer
April 2, 2025
PostgreSQL is an open-source relational database management system known for its extensibility, which allows developers to enhance its capabilities through various extensions and plugins. The pgstattuple extension provides detailed statistics at the tuple level from PostgreSQL tables and indexes, revealing key metrics such as the number of live tuples, dead tuples, average length of live tuples, total free space, and percentages of free space and dead tuples. These metrics help database administrators identify potential health and performance issues, such as excessive table bloat or index fragmentation. Both Amazon Aurora and Amazon RDS support the pgstattuple extension, which can be activated using the command CREATE EXTENSION pgstattuple;. Functions like pgstattuple(relation) and pgstatindex(index) can be used to analyze physical storage and index statistics. Bloat occurs when unused space is left behind after UPDATE and DELETE operations, and the autovacuum process in PostgreSQL automates the cleanup of dead tuples. However, if autovacuum fails, manual intervention may be necessary. Regular monitoring of bloat is essential for maintaining performance, and metrics from pgstattuple can help optimize autovacuum settings. The pg_cron extension can automate VACUUM operations to manage bloat proactively. Index bloat can also be detected using pgstatindex, and significantly bloated indexes can be rebuilt using REINDEX or pg_repack. Best practices for using pgstattuple include estimating bloat with check_postgres, analyzing physical storage, monitoring dead_tuple_percent, and avoiding interference on highly active tables.
Tech Optimizer
April 2, 2025
Over 1,500 PostgreSQL instances exposed to the internet have been targeted by a cryptocurrency mining malware campaign called JINX-0126. Attackers exploit weak credentials to access PostgreSQL servers and use the "COPY ... FROM PROGRAM SQL" command for arbitrary command execution. They deploy a shell script to terminate existing cryptominers and deliver the pg_core binary. A Golang binary, disguised as the PostgreSQL multi-user database server, is then downloaded to establish persistence and escalate privileges, leading to the execution of the latest XMRig cryptominer variant. JINX-0126 employs advanced tactics, including unique hashes for binaries and fileless miner payload execution, to evade detection by cloud workload protection platforms.
AppWizard
April 2, 2025
Google has launched a dashcam application for Android Automotive that allows vehicles with built-in cameras to record their surroundings. This open-source app can be integrated by car manufacturers, addressing the gap where many vehicles lack a native dashcam feature. The app is designed to work with existing camera hardware and requires system-level permissions for integration into the vehicle's operating system. Recordings are stored in the vehicle's internal storage, but Google recommends saving them on external removable storage to reduce wear on internal components. Manufacturers can customize various parameters of the app, including storage allocation and user interface.
AppWizard
April 2, 2025
Google is refining its music identification capabilities on Android devices, with potential upgrades revealed through an APK teardown. Currently, users can identify songs using features like Circle to Search and Now Playing, but the process often requires manual prompts. The latest version of the Google app (build 16.12.39.sa.arm64) shows signs of automatic music detection, changing the interface to "Searching song..." upon recognition, although users still need to tap a button to view results. The absence of the typical pulsing-sphere visual element indicates that this feature is still in development.
AppWizard
April 1, 2025
Google has introduced a yellow warning banner in the Google Play Store to alert Android users about apps that are frequently uninstalled. This banner indicates that an app may not be meeting user expectations and could be due to poor functionality, excessive advertisements, or inflated costs. Additionally, Google has implemented two other notifications: one indicating lower user engagement with an app and another showing fewer users compared to other apps. These features aim to help users make more informed app choices and avoid potentially harmful applications. Google Play Protect is also available to scan downloaded apps for security, including those from outside the Play Store. Users can enable settings to improve harmful app detection, enhancing overall safety in the app ecosystem.
Tech Optimizer
March 31, 2025
A new malware strain called CoffeeLoader has been identified, posing a significant risk to gamers by masquerading as a legitimate ASUS utility, specifically the Armoury Crate software. Once it infiltrates a system, it deploys the Rhadamanthys infostealer, which can extract sensitive information such as credentials from web browsers, email clients, cryptocurrency wallets, and password managers. CoffeeLoader evades detection by most security tools by operating on the GPU instead of the CPU and using advanced techniques like call stack spoofing, sleep obfuscation, and exploiting Windows fibers. To protect against CoffeeLoader, users should exercise caution when downloading software, navigate directly to official websites, avoid suspicious links, and adhere to basic cybersecurity practices. If infection is suspected, users should disconnect from the internet, reboot in safe mode, delete temporary files, and check Task Manager for unusual activity. Employing a reliable malware scanner can help identify and eliminate infections.
Search