AI Market Logo
BTC $43,552.88 -0.46%
ETH $2,637.32 +1.23%
BNB $312.45 +0.87%
SOL $92.40 +1.16%
XRP $0.5234 -0.32%
ADA $0.8004 +3.54%
AVAX $32.11 +1.93%
DOT $19.37 -1.45%
MATIC $0.8923 +2.67%
LINK $14.56 +0.94%
HAIA $0.1250 +2.15%
BTC $43,552.88 -0.46%
ETH $2,637.32 +1.23%
BNB $312.45 +0.87%
SOL $92.40 +1.16%
XRP $0.5234 -0.32%
ADA $0.8004 +3.54%
AVAX $32.11 +1.93%
DOT $19.37 -1.45%
MATIC $0.8923 +2.67%
LINK $14.56 +0.94%
HAIA $0.1250 +2.15%
AI-forged panda images hide persistent cryptomining malware ‘Koske’
malware

AI-forged panda images hide persistent cryptomining malware ‘Koske’

Koske malware hides cryptomining rootkits in AI-crafted panda JPEGs, exploiting Linux systems via misconfigured JupyterLab instances.

July 25, 2025
5 min read
Shweta Sharma

Koske malware hides cryptomining rootkits in AI-crafted panda JPEGs, exploiting Linux systems via misconfigured JupyterLab instances.

AI-Forged Panda Images Hide Persistent Cryptomining Malware ‘Koske’

A new Linux malware strain named Koske is delivering cryptomining payloads through dropper files disguised as benign panda images. The malware campaign leverages AI-generated code and weaponized panda JPEGs to deploy stealthy and persistent rootkits designed for cryptomining. According to Aqua Nautilus, the cybersecurity team at Aqua Security, Koske likely uses AI assistance, as its code appears shaped by large language models (LLMs). Aqua researcher Assaf Morag described Koske as “a sophisticated Linux threat” showing clear signs of AI-assisted development, representing a new breed of persistent and adaptable malware built specifically for cryptomining.

Initial Access and Delivery via Panda Images

The attack begins by exploiting a misconfigured JupyterLab instance, allowing attackers to download two polyglot JPEG files from a shortened URL. These files are regular images with appended executable payloads. Morag explained that the initial access originated from a Serbian IP address exploiting unauthenticated JupyterLab instances exposed to the internet—a common but risky practice. Weak passwords and known remote code execution (RCE) vulnerabilities also contribute to such compromises. One possible entry point is CVE-2025-30370, a high-severity vulnerability in the JupyterLab-git extension that allows command injection. When executed, the panda images extract and run malicious C code and shell scripts directly in memory, bypassing traditional antivirus detection by never writing the payloads to disk. The files blend image data with executable shellcode, making detection difficult.

Modular Payload for Stealth and Persistence

Koske employs multiple tactics to maintain stealth and persistence:
  • It hijacks hidden Bash shell configuration files to execute custom system scripts that maintain communication with command-and-control (C2) servers.
  • The rootkit, written in C, hooks the readdir() system call to hide processes and files named “Koske” or “hideproc.”
  • It registers itself as a background service and sets up recurring scheduled tasks.
  • The malware uses adaptive logic, including proxy-checking routines and intelligent selection among 18 different cryptocurrency miners, with fallback behaviors likely borrowed from AI functions.
  • Aqua Security recommends monitoring for unauthorized Bash modifications, unexpected DNS rewrites, and anomalous shell behavior using runtime protection telemetry. Blocking execution of polyglot file payloads and hidden rootkits is also advised.

    Indicators of Compromise (IOCs)

    The blog post by Aqua Nautilus includes IP addresses, URLs, and filenames associated with the Koske campaign, which organizations can use to detect potential infections. For more details, see the original article at CSO Online

    FAQ

    What is the main threat posed by Koske malware?

    Koske's main threat lies in its ability to use AI-generated code for deploying cryptomining rootkits, which are hard to detect and persistent.

    How does Koske gain initial access to systems?

    Koske gains initial access by exploiting weak configurations and vulnerabilities in JupyterLab instances, particularly leveraging CVE-2025-30370.

    What makes Koske malware hard to detect?

    Koske’s use of polyglot JPEG files, which combine image and executable data, allows it to run payloads directly in memory without leaving a trace on disk, bypassing traditional antivirus measures.

    How can organizations protect themselves from Koske?

    Organizations can protect themselves by monitoring for unauthorized changes, employing runtime protection telemetry, and ensuring robust security practices to prevent misconfigurations.

    Crypto Market's Take

    Understanding the AI-assisted capabilities of malware like Koske is crucial for the cryptocurrency industry. At Crypto Market, we emphasize the importance of AI in improving security protocols and offering enhanced protection for our users engaged in cryptocurrency trading. Our platform regularly updates its systems to counter such threats and aligns with global security standards to protect digital assets. For more insights, explore our AI Agents section to learn how AI is shaping the future of cryptocurrency trading.

    More to Read:

  • How to Evaluate Cryptocurrency
  • Turbocharged Cyberattacks Are Coming Under Empowered AI Agents
  • Exclusive: Sysdig and BitMEX Sound Alarm on AI-Powered Crypto Threats
  • Crypto Market Today