
Analysts from AquaSec discovered new malware for Linux. The malware, named Koske, is believed to have been developed using AI. To execute directly into memory, the malware uses JPEG images of pandas.
Researchers describe Koske as a “sophisticated Linux threat,” whose adaptive behavior suggests that the malware is being developed using large language models (LLMs) or automation frameworks.
The main goal of Koske is to deploy CPU- and GPU-optimized miners that utilize the host’s computing resources to mine various cryptocurrencies.
As Serbian IP addresses and phrases were discovered in the scripts during the study of the malware, along with the Slovak language in the GitHub repository where the miners were hosted, experts were unable to determine a precise attribution.
Initial access is gained by attackers exploiting misconfigurations in JupyterLab, which allow for command execution. After this, the attackers download two .JPEG images of pandas into the victim’s system, hosted on legitimate services such as OVH images, freeimage, and postimage. The malicious payload is hidden within these images.
It is emphasized that the hackers do not use steganography to hide malware inside the images. Instead, they rely on polyglot files, which can be read and interpreted as several different formats. In Koske attacks, the same file can be interpreted as an image or a script, depending on the application that opens or processes it.
Images of pandas contain not only the picture itself, with correct JPEG format headers, but also malicious shell scripts and code written in C, allowing for both formats to be interpreted separately. That is, when opening such a file, the user will only see a cute panda, while the script interpreter will execute the code added at the end of the file.

Researchers report that each image hides one payload, with both being executed in parallel.
“One payload consists of C code, which is directly written into memory, compiled, and executed as a shared object (.so file), functioning as a rootkit,” explain the experts. “The second payload is a shell script, which is also executed from memory. It uses standard Linux system utilities for stealth and persistence, leaving minimal traces.”
The script also ensures connection stability and bypasses network restrictions: it rewrites /etc/resolv.conf to use DNS from Cloudflare and Google, and protects this file with chattr +i. Additionally, the malware resets iptables rules, clears system variables related to proxies, and runs a custom module for brute-forcing working proxies using curl, wget, and direct TCP requests.
Due to this adaptability and behavior, researchers suggest that the malware may have been developed either with the help of large language models (LLM) or using automation platforms.
Before deploying on the victim’s machine, the malware assesses the host’s capabilities (CPU and GPU) to select the most suitable miner: Koske supports mining 18 different cryptocurrencies, including Monero, Ravencoin, Zano, Nexa, and Tari.
If a certain currency or pool becomes unavailable, the malware automatically switches to a backup option from an internal list, which also indicates a high degree of automation and flexibility.

2025.04.04 — Privilege escalation vulnerability in Google Cloud resulting in sensitive data leaks finally patched
Tenable Research revealed details of a recently patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run enabling an attacker to gain access to container images…
Full article →
2025.03.07 — YouTube warns of scam video featuring its CEO
According to YouTube, scammers use an AI-generated video of the company's CEO in phishing attacks to steal user credentials. The scammers attack content creators by sending them…
Full article →
2025.02.12 — 2.8 million IP addresses used to brute-force network devices
The Shadowserver Foundation warns of a massive web login brute-forcing attacks targeting nearly 2.8 million IP addresses per day. Unknown attackers are seeking…
Full article →
2025.04.16 — Android devices will restart every three days to protect user data
Google introduces a new security feature for Android devices: locked and unused devices will be automatically restarted after three days of inactivity to return their memory to an…
Full article →
2025.03.28 — Zero-day vulnerability in Windows results in NTLM hash leaks
Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows…
Full article →
2025.01.24 — Hundreds of websites impersonating Reddit and WeTransfer spread Lumma Stealer
Sekoia researcher crep1x discovered that hackers are currently using some 1,000 pages impersonating Reddit and WeTransfer. Victims visiting these sites are tricked into…
Full article →
2025.02.10 — Failed attempt to block phishing link results in massive Cloudflare outage
According to the incident report released by Cloudflare, an attempt to block a phishing URL on the R2 platform accidentally caused a massive outage; as a result, many Cloudflare…
Full article →
2025.01.28 — J-magic backdoor attacked Juniper Networks devices using 'magic packets'
A massive backdoor attack targeting Juniper routers often used as VPN gateways has been uncovered. The devices were attacked by the J-magic malware that…
Full article →
2025.02.08 — Hackers exploit RCE vulnerability in Microsoft Outlook
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned Federal Civilian Executive Branch (FCEB) Agencies that they have to secure their systems from ongoing…
Full article →
2025.02.23 — New JavaScript obfuscation technique uses invisible Unicode characters
According to Juniper Threat Labs , a new JavaScript obfuscation technique that uses invisible Unicode characters was used in a phishing attack targeting Political Action…
Full article →