Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?

    How The Wall Street Journal is strategizing for ‘Google zero’

    WPP’s new boss Cindy Rose starts today: Here’s what will be on her to-do list

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Blue-collar jobs are gaining popularity as AI threatens office work

      August 17, 2025

      Man who asked ChatGPT about cutting out salt from his diet was hospitalized with hallucinations

      August 15, 2025

      What happens when chatbots shape your reality? Concerns are growing online

      August 14, 2025

      Scientists want to prevent AI from going rogue by teaching it to be bad first

      August 8, 2025

      AI models may be accidentally (and secretly) learning each other’s bad behaviors

      July 30, 2025
    • Business

      Why Certified VMware Pros Are Driving the Future of IT

      August 24, 2025

      Murky Panda hackers exploit cloud trust to hack downstream customers

      August 23, 2025

      The rise of sovereign clouds: no data portability, no party

      August 20, 2025

      Israel is reportedly storing millions of Palestinian phone calls on Microsoft servers

      August 6, 2025

      AI site Perplexity uses “stealth tactics” to flout no-crawl edicts, Cloudflare says

      August 5, 2025
    • Crypto

      Max Keiser Says Flee to El Salvador as Kiyosaki Declares Europe ‘Toast’

      August 31, 2025

      New Mystery Coin on Pump.fun Reportedly Hits $1.8 Million in 24H Volume

      August 31, 2025

      Trump Family’s $750 Million Crypto Deal Raises Questions Ahead of WLFI Token Debut

      August 31, 2025

      CZ Backs DeFi Dominance As Japan Post Bank Unveils $1.3 Trillion Digital Currency Plan

      August 31, 2025

      Hedera (HBAR) Price Eyes New Lows Despite Major Whale Buying Actions

      August 31, 2025
    • Technology

      Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?

      September 1, 2025

      How The Wall Street Journal is strategizing for ‘Google zero’

      September 1, 2025

      WPP’s new boss Cindy Rose starts today: Here’s what will be on her to-do list

      September 1, 2025

      The creator economy wants to be a mature media channel, but measurement is holding it back

      September 1, 2025

      How resell platforms like ThredUp, Depop are navigating the tariff economy

      September 1, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»New Koske Linux malware hides in cute panda images
    Technology

    New Koske Linux malware hides in cute panda images

    TechAiVerseBy TechAiVerseJuly 28, 2025No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New Koske Linux malware hides in cute panda images
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    BMI Calculator – Check your Body Mass Index for free!

    New Koske Linux malware hides in cute panda images

    A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG images of panda bears to deploy malware directly into system memory.

    Researchers from cybersecurity company AquaSec analyzed Koske and described it as “a sophhisticated Linux threat.” Based on the observed adaptive behavior, the researchers believe that the malware was developed using large language models (LLMs) or automation frameworks.

    Koske’s purpose is to deploy CPU and GPU-optimized cryptocurrency miners that use the host’s computational resources to mine over 18 distinct coins.

    AquaSec identified Serbia-based IP addresses used in the attacks, Serbian phrases in the scripts, and Slovak language in the GitHub repository hosting the miners, but it could make no confident attribution.

    Pandas attack

    Initial access is achieved by leveraging misconfigurations of JupyterLab instances exposed online to achieve command execution.

    After gaining a foothold, the attacker downloads two .JPEG images of panda bears hosted on legitimate services like OVH images, freeimage, and postimage. However, the pictures hide malicious payloads.

    AquaSec underlines that the threat actor did not use steganography to hide the malware inside images but relied on polyglot files, which are valid in multiple formats.

    In Koske attacks, the same file can be interpreted as both an image and a script, depending on the application that opens or processes it.

    While the panda pics feature valid image headers for the JPEG format, they also include malicious shell scripts and C code at the end, allowing both formats to be interepreted separately.

    A user opening them will see a cute panda bear but a script interpreter will execute the shell code appended at the end of the file.

    Seemingly innocuous panda image (top), file contents (bottom)
    Source: AquaSec

    The attacks AquaSec discovered hide one payload in each image, both launched in parallel.

    “One payload is C code written directly to memory, compiled, and executed as a shared object .so file that functions as a rootkit,” explains AquaSec.

    “The second is a shell script, also executed from memory, which uses standard system utilities to run stealthily and maintain persistence while leaving few visible traces.”

    The shell script is executed directly in memory by abusing native Linux utilities, establishing persistence via cron jobs that run every 30 minutes, and custom systemd services.

    It also performs network hardening and proxy evasion, overwriting /etc/resolv.conf to use Cloudflare and Google DNS, locking it using the chattr +i command, flushing iptables, resetting proxy variables, and using a custom module to brute-force working proxies via curl, wget, and raw TCP checks.

    This type of adaptability and behavior is what led AquaSec researchers to suspect that the threat actor developed the malware either with the help of a LLM or an automation platform.

    The C-based rootkit is compiled in memory and uses LD_PRELOAD to override the readdir() function, hiding malware-related processes, files, and directories from user-space monitoring tools.

    The rootkit filters entries based on strings like koske, hideproc, or by reading hidden PIDs from /dev/shm/.hiddenpid.

    After establishing network access and setting up persistence, the shell script downloads cryptominers from GitHub.

    Complete attack chain
    Source: AquaSec

    Before deployment, the host’s CPU and GPU are evaluated to determine which miner would be the most efficient choice.

    Koske supports mining for 18 different coins, including the hard-to-trace Monero, Ravencoin, Zano, Nexa, and Tari.

    If a coin or mining pool becomes unavailable, the malware automatically switches to a backup from its internal list, indicating a high degree of automation and adaptability.

    AquaSec warns that while AI-powered malware like Koske is already concerning, future variants may leverage real-time adaptability, evolving into a far more dangerous class of threats.


    The Board Report Deck CISOs Actually Use

    CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

    This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

    BMI Calculator – Check your Body Mass Index for free!

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleReddit and Discord’s UK age verification can be defeated by Death Stranding’s photo mode
    Next Article Scattered Spider is running a VMware ESXi hacking spree
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?

    September 1, 2025

    How The Wall Street Journal is strategizing for ‘Google zero’

    September 1, 2025

    WPP’s new boss Cindy Rose starts today: Here’s what will be on her to-do list

    September 1, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025169 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202548 Views

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202530 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202528 Views
    Don't Miss
    Technology September 1, 2025

    Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?

    Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?This Media Buying Briefing…

    How The Wall Street Journal is strategizing for ‘Google zero’

    WPP’s new boss Cindy Rose starts today: Here’s what will be on her to-do list

    The creator economy wants to be a mature media channel, but measurement is holding it back

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Media Buying Briefing: What’s going to happen with Dentsu outside of Japan?

    September 1, 20252 Views

    How The Wall Street Journal is strategizing for ‘Google zero’

    September 1, 20252 Views

    WPP’s new boss Cindy Rose starts today: Here’s what will be on her to-do list

    September 1, 20251 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.