Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and More

    Keep Your Dry Streak Going With These 13 Best Nonalcoholic Drinks

    New Trump Phone Reportedly Costs More, Looks Different, and Isn’t Made in America

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      HBAR Shorts Face $5 Million Risk if Price Breaks Key Level

      February 10, 2026

      Ethereum Holds $2,000 Support — Accumulation Keeps Recovery Hopes Alive

      February 10, 2026

      Miami Mansion Listed for 700 BTC as California Billionaire Tax Sparks Relocations

      February 10, 2026

      Solana Drops to 2-Year Lows — History Suggests a Bounce Toward $100 is Incoming

      February 10, 2026

      Bitget Cuts Stock Perps Fees to Zero for Makers Ahead of Earnings Season, Expanding Access Across Markets

      February 10, 2026
    • Technology

      Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and More

      February 10, 2026

      Keep Your Dry Streak Going With These 13 Best Nonalcoholic Drinks

      February 10, 2026

      New Trump Phone Reportedly Costs More, Looks Different, and Isn’t Made in America

      February 10, 2026

      TikTok-Linked AI Video Tool Debuts With a Catch for the US

      February 10, 2026

      24 Best Last-Minute Valentine’s Day Gifts in 2025: Physical and Digital Options for Everyone

      February 10, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»New Koske Linux malware hides in cute panda images
    Technology

    New Koske Linux malware hides in cute panda images

    TechAiVerseBy TechAiVerseJuly 28, 2025No Comments4 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New Koske Linux malware hides in cute panda images
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    New Koske Linux malware hides in cute panda images

    A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory.

    Researchers from cybersecurity company AquaSec analyzed Koske and described it as “a sophhisticated Linux threat.” Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks.

    Koske’s purpose is to deploy CPU and GPU-optimized cryptocurrency miners that use the host’s computational resources to mine over 18 distinct coins.

    AquaSec identified Serbia-based IP addresses used in the attacks, Serbian phrases in the scripts, and Slovak language in the GitHub repository hosting the miners, but it could make no confident attribution.

    Pandas attack

    Initial access is achieved by leveraging misconfigurations of JupyterLab instances exposed online to achieve command execution.

    After gaining a foothold, the attacker downloads two .JPEG images of panda bears hosted on legitimate services like OVH images, freeimage, and postimage. However, the pictures hide malicious payloads.

    AquaSec underlines that the threat actor did not use steganography to hide the malware inside images but relied on polyglot files, which are valid in multiple formats.

    In Koske attacks, the same file can be interpreted as both an image and a script, depending on the application that opens or processes it.

    While the panda pics feature valid image headers for the JPEG format, they also include malicious shell scripts and C code at the end, allowing both formats to be interepreted separately.

    A user opening them will see a cute panda bear but a script interpreter will execute the shell code appended at the end of the file.

    Seemingly innocuous panda image (top), file contents (bottom)
    Source: AquaSec

    The attacks AquaSec discovered hide one payload in each image, both launched in parallel.

    “One payload is C code written directly to memory, compiled, and executed as a shared object .so file that functions as a rootkit,” explains AquaSec.

    “The second is a shell script, also executed from memory, which uses standard system utilities to run stealthily and maintain persistence while leaving few visible traces.”

    The shell script is executed directly in memory by abusing native Linux utilities, establishing persistence via cron jobs that run every 30 minutes, and custom systemd services.

    It also performs network hardening and proxy evasion, overwriting /etc/resolv.conf to use Cloudflare and Google DNS, locking it using the chattr +i command, flushing iptables, resetting proxy variables, and using a custom module to brute-force working proxies via curl, wget, and raw TCP checks.

    This type of adaptability and behavior is what led AquaSec researchers to suspect that the threat actor developed the malware either with the help of a LLM or an automation platform.

    The C-based rootkit is compiled in memory and uses LD_PRELOAD to override the readdir() function, hiding malware-related processes, files, and directories from user-space monitoring tools.

    The rootkit filters entries based on strings like koske, hideproc, or by reading hidden PIDs from /dev/shm/.hiddenpid.

    After establishing network access and setting up persistence, the shell script downloads cryptominers from GitHub.

    Complete attack chain
    Source: AquaSec

    Before deployment, the host’s CPU and GPU are evaluated to determine which miner would be the most efficient choice.

    Koske supports mining for 18 different coins, including the hard-to-trace Monero, Ravencoin, Zano, Nexa, and Tari.

    If a coin or mining pool becomes unavailable, the malware automatically switches to a backup from its internal list, indicating a high degree of automation and adaptability.

    AquaSec warns that while AI-powered malware like Koske is already concerning, future variants may leverage real-time adaptability, evolving into a far more dangerous class of threats.


    The Board Report Deck CISOs Actually Use

    CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

    This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleReddit and Discord’s UK age verification can be defeated by Death Stranding’s photo mode
    Next Article Scattered Spider is running a VMware ESXi hacking spree
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and More

    February 10, 2026

    Keep Your Dry Streak Going With These 13 Best Nonalcoholic Drinks

    February 10, 2026

    New Trump Phone Reportedly Costs More, Looks Different, and Isn’t Made in America

    February 10, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025663 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025250 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025150 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 10, 2026

    Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and More

    Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and…

    Keep Your Dry Streak Going With These 13 Best Nonalcoholic Drinks

    New Trump Phone Reportedly Costs More, Looks Different, and Isn’t Made in America

    TikTok-Linked AI Video Tool Debuts With a Catch for the US

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Best PlayStation 5 Controllers in 2026: The Top PS5 Controllers From Sony, Razer, Nacon and More

    February 10, 20262 Views

    Keep Your Dry Streak Going With These 13 Best Nonalcoholic Drinks

    February 10, 20262 Views

    New Trump Phone Reportedly Costs More, Looks Different, and Isn’t Made in America

    February 10, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.