Aqua Blog
Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance
Hadooken Malware Targets Weblogic Applications

Hadooken Malware Targets Weblogic Applications

Aqua Nautilus researchers identified a new Linux malware targeting Weblogic servers. The main payload calls itself Hadooken which we think is referring to the attack “surge fist” in the Street Fighter series. When Hadooken is executed, it drops a Tsunami malware and deploys a cryptominer. In this blog, we explain the …

Continue reading ›
Embracing the Future: AWS Customers Leverage Fargate for ECS and EKS Deployments

Embracing the Future: AWS Customers Leverage Fargate for ECS and EKS Deployments

As organizations advance in their cloud native journey, the adoption of AWS Fargate for ECS (Elastic Container Service) and EKS (Elastic Kubernetes Service) increases. Many customers begin their cloud journey with Amazon ECS, with around 65% of new AWS container customers opting for ECS. This popularity is driven by …

Continue reading ›
PG_MEM: A Malware Hidden in the Postgres Processes

PG_MEM: A Malware Hidden in the Postgres Processes

Aqua Nautilus researchers have uncovered PG_MEM, a new PostgreSQL malware, that brute forces its way into PostgreSQL databases, delivers payloads to hide its operations, and mines cryptocurrency. In this blog, we explain this attack, the techniques used by the threat actor, and how to detect and protect your …

Continue reading ›
Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments

Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments

Aqua Nautilus researchers discovered a new variant of Gafgyt botnet. This campaign is targeting machines with weak SSH passwords, executing 2 binaries from memory to increase the Gafgyt botnet and mine crypto currency with GPU power, indicating that the IoT botnet is targeting more robust servers running on cloud …

Continue reading ›
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources

Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources

During February 2024, we discovered critical vulnerabilities in six AWS services. The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing sensitive data, data exfiltration and …

Continue reading ›
TrailShark: Understanding AWS API and Service Interactions

TrailShark: Understanding AWS API and Service Interactions

In this blog, we introduce TrailShark, a plugin that connects Wireshark with AWS CloudTrail logs. This open-source tool was developed as part of the “Bucket Monopoly” research, during which we identified six vulnerabilities in AWS by tracking service interactions and internal API calls. These vulnerabilities range …

Continue reading ›
Go deeper: Linux runtime visibility meets Wireshark

Go deeper: Linux runtime visibility meets Wireshark

Aqua Tracee is an open source runtime security and forensics tool for Linux, built to address common Linux security issues. Tracee’s main use case is to be installed in a production environment and continuously monitor system activity and detect suspicious behavior. Some alternative use cases which Tracee can be used …

Continue reading ›
Panamorfi: A New Discord DDoS Campaign

Panamorfi: A New Discord DDoS Campaign

Aqua Nautilus researchers uncovered a new Distributed Denial of Service (DDoS) campaign dubbed ‘Panamorfi’, utilizing the Java written minecraft DDoS package - mineping - the threat actor launches a DDoS. Thus far we've only seen it deployed via misconfigured Jupyter notebooks. In this blog we explain about this …

Continue reading ›
Kubernetes History: How It Conquered Cloud Native Orchestration

Kubernetes History: How It Conquered Cloud Native Orchestration

Did you know that Kubernetes originally had no built-in features for managing user permissions, or that support for storing data persistently didn't appear until Kubernetes was four years old?

Continue reading ›
Kubernetes Exposed: Exploiting the Kubelet API

Kubernetes Exposed: Exploiting the Kubelet API

Kubelet API is a vital component in Kubernetes clusters that manages pods and their containers on each node. While it is not typically intended for direct user interaction, many DevOps teams may utilize the Kubelet API for debugging and direct node communication. However, exposing the Kubelet API to the public …

Continue reading ›
Compliance to Implementation: Exploring DORA and NIS 2 Frameworks

Compliance to Implementation: Exploring DORA and NIS 2 Frameworks

The importance of cybersecurity and operational resilience in the financial sector has never been more pronounced. The European Union (EU) has been at the forefront of addressing these critical issues, enacting comprehensive legislations to safeguard the digital infrastructure and ensure the continuity of financial …

Continue reading ›