Poorly protected PostgreSQL databases on Linux are being targeted by cryptojacking attackers. Aqua Security researchers observed attackers brute-forcing access credentials, creating new high-privilege user roles, removing superuser privileges from compromised roles, and downloading payloads that eliminate competing cryptomining malware. PostgreSQL databases, often found in cloud and on-premises environments, are frequent targets due to lax security or misconfigurations. To protect these databases, using firewalls, VPNs, SSH tunnels, strong passwords, audit logs, and intrusion detection systems is advised.

3m read timeFrom helpnetsecurity.com
Post cover image
Table of contents
A wide pool of potential targetsHow to protect your PostgreSQL installations against cryptojacking?
2 Comments

Sort: