Blogs

Kinsing Threat Guide

Product

Kinsing Threat Guide

Kinsing Threat Guide

Finn Callaghan

Jul 1, 2024

Latest Headline

Kinsing malware has significantly escalated its attacks on Apache Tomcat servers, exploiting multiple vulnerabilities. Known for targeting Linux-based cloud infrastructure, this malware installs backdoors and cryptominers, primarily using the XMRig software to mine Monero cryptocurrency. The malware is challenging to detect as it conceals itself within overlooked system directories.

Key Points:

  • Active since at least January 2020

  • Targets Apache Tomcat servers since mid-2023

  • 1767 IOCs as of publication

 

Fletch is constantly monitoring the threat landscape. The data in this guide is most up to date as of publication. Check out Kinsing’s Threat Board for any updates or join Fletch to be in the know for every threat.

 

Kinsing Group Summary

Kinsing, also known as H2Miner, has been reported by various cybersecurity firms, including Tenable Research and AquaSec. While it is not specifically attributed to any country, its activities have been observed globally. Kinsing is part of a larger group involved in cryptojacking campaigns, targeting a wide range of open-source applications and cloud services.

  • Severity: Low

  • Maturity: Mainstream

  • IOCs: 1767 Malware hashes and 5 vulnerabilities

  • Targets: 14 tech targets, 1 industry targets, and 8 geo targets

 

Learn more about Fletch’s metrics in the Fletch Help Center.

Kinsing Victims & Motivations

The technologies targeted by Kinsing include Linux cloud servers, Apache Tomcat, Docker, PostgreSQL, and Redis. The industries affected are broad, encompassing enterprises that utilize open-source software and cloud services. The malware's initial detection was in China, but its attacks have been widespread across various regions. The primary motivation behind Kinsing's activities is financial gain through unauthorized crypto mining.

Kinsing Tactics

Kinsing employs various methodologies to gain unauthorized access, such as exploiting vulnerabilities and installing backdoors. Once inside a system, it deploys cryptominers to use the system's resources for mining Monero. The malware hides within legitimate system directories to avoid detection, making it blend in with non-suspicious files. This stealthy approach allows the malware to persist on compromised systems for extended periods.

Mitigation Advice

At the time of publication this was the mitigation advice against Kinsing:

  • Disable or securely configure Docker API and Kubernetes to prevent unauthorized access.

  • Update Apache Tomcat servers to the latest version to patch any critical vulnerabilities that could be exploited by the malware.

  • Update all Apache ActiveMQ servers to the latest patched version to address the CVE-2023-46604 vulnerability. 

  • Ensure all Linux systems are patched against the Looney Tunables vulnerability (CVE-2023-4911)

  • Update all instances of Openfire to the latest version to patch the vulnerability (CVE-2023-32315). 

At the time of publication these were the right compliance controls to focus on for Kinsing:

  • Set proper permissions for files and directories to prevent unauthorized access.

  • Limit the use of PowerShell to only administrators and restrict what commands can be executed.

  • Ensure all employees have the correct permissions for their job roles. 

  • Install and regularly update antivirus software on all company devices. 

 

You can check out the most recent mitigation measures by creating an account when you join Fletch.

 

Communication

On top of mitigation advice, Fletch also provides Beta AI generated communications so you can educate your different company stakeholders. At the time of publication, this was what was recommended for the following:

For employees:

 

For more templates for your different stakeholders, create a workspace when you join Fletch.

 

Takeaway

Kinsing represents a persistent and evolving threat to Linux-based cloud infrastructure. Its ability to exploit vulnerabilities and hide within overlooked system directories makes it particularly challenging to detect and mitigate. Organizations must ensure rigorous monitoring, timely patching of vulnerabilities, and the implementation of comprehensive security measures to defend against such sophisticated threats. The continuous evolution of Kinsing underscores the need for adaptive and proactive cybersecurity strategies.

Kinsing is just one example of an ever evolving threat that Fletch helps you keep track of, and prioritizes. 

Our AI engine is constantly scanning and indexing the threat landscape for you so you can plug the gaps in your security. You can use Fletch to prioritize your alerts, forecast threats on your horizon, and give you daily advice on what to do.

 

Join Fletch and try it for yourself.

1. [Tenable](https://www.tenable.com/blog/kinsing-malware-hides-itself-as-a-manual-page-and-targets-cloud-servers)

2. [GBHackers](https://www.gbhackers.com/kinsing-malware-attacking-apache-tomcat-server-with-vulnerabilities)

3. [SecurityOnline](https://securityonline.info/the-hidden-threat-in-man-pages-kinsing-malware-targets-apache-tomcat-servers)

4. [JSPlaces](https://www.jsplaces.com/gbhackers/20/05/2024/kinsing-malware-attacking-apache-tomcat-servers-to-deploy-cryptominers)

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access

See how much time you can save

Fletch surfaces the 5% of threats that matter to you right now. You’ll have every detail about the threat, what to do about it and what to say. 

Get API access