← Back to BrewedIntel
malwarehighCloud CompromiseCryptominingCPU_HU

Mar 31, 2025 • Wiz Security Research

CPU_HU: Fileless cryptominer targeting exposed PostgreSQL with over 1.5K victims

Attackers are actively targeting cloud environments by exploiting exposed PostgreSQL instances to deploy fileless cryptominer payloads. This campaign,...

Source
Wiz Security Research
Category
malware
Severity
high

Executive Summary

Attackers are actively targeting cloud environments by exploiting exposed PostgreSQL instances to deploy fileless cryptominer payloads. This campaign, identified as CPU_HU, has already compromised over 1,500 victims, highlighting significant risks to cloud infrastructure security. The attack leverages weak configurations to gain initial access and execute malicious code without writing files to disk, evading traditional detection methods. The primary impact involves resource hijacking for cryptocurrency mining, leading to performance degradation and increased operational costs. Organizations utilizing PostgreSQL in cloud settings must prioritize securing database instances against unauthorized access. Immediate mitigation steps include enforcing strong authentication, restricting network exposure, and monitoring for suspicious process activity. This trend underscores the growing threat of fileless malware targeting misconfigured cloud services, requiring enhanced visibility and hardening measures to protect sensitive environments from similar cryptomining operations.

Summary

Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.

Published Analysis

Attackers are actively targeting cloud environments by exploiting exposed PostgreSQL instances to deploy fileless cryptominer payloads. This campaign, identified as CPU_HU, has already compromised over 1,500 victims, highlighting significant risks to cloud infrastructure security. The attack leverages weak configurations to gain initial access and execute malicious code without writing files to disk, evading traditional detection methods. The primary impact involves resource hijacking for cryptocurrency mining, leading to performance degradation and increased operational costs. Organizations utilizing PostgreSQL in cloud settings must prioritize securing database instances against unauthorized access. Immediate mitigation steps include enforcing strong authentication, restricting network exposure, and monitoring for suspicious process activity. This trend underscores the growing threat of fileless malware targeting misconfigured cloud services, requiring enhanced visibility and hardening measures to protect sensitive environments from similar cryptomining operations. Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads. Cloud environments at risk: Attackers target weak PostgreSQL instances with fileless cryptominer payloads.

Linked Entities

  • CPU_HU