• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
python based pyloose fileless attack targets cloud workloads for cryptocurrency mining

Python-Based PyLoose Fileless Attack Targets Cloud Workloads for Cryptocurrency Mining

You are here: Home / General Cyber Security News / Python-Based PyLoose Fileless Attack Targets Cloud Workloads for Cryptocurrency Mining
July 12, 2023

A new fileless attack dubbed PyLoose has been observed striking cloud workloads with the objective of delivering a cryptocurrency miner, new findings from Wiz expose.

“The attack is composed of Python code that hundreds an XMRig Miner directly into memory using memfd, a identified Linux fileless strategy,” security scientists Avigayil Mechtinger, Oren Ofer, and Itamar Gilad explained. “This is the initially publicly documented Python-primarily based fileless attack concentrating on cloud workloads in the wild.”

The cloud security agency said it identified practically 200 occasions where by the attack process was utilized for cryptocurrency mining. No other specifics about the risk actor are currently known other than the fact that they have sophisticated abilities.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In the an infection chain documented by Wiz, initial access is realized by way of the exploitation of a publicly obtainable Jupyter Notebook company that allowed for the execution of technique instructions applying Python modules.

PyLoose, very first detected on June 22, 2023, is a Python script with just nine strains of code that embeds a compressed and encoded precompiled XMRig miner. The payload is retrieved from paste.c-net[.]org into the Python runtime’s memory by means of an HTTPS GET ask for with no possessing to create the file to disk.

The Python code is built to decode and decompress the XMRig miner and then load it specifically into memory by way of the memfd memory file descriptor, which is used to access memory-resident documents.

Future WEBINARShield Towards Insider Threats: Grasp SaaS Security Posture Administration

Worried about insider threats? We have received you coated! Be a part of this webinar to investigate sensible tactics and the strategies of proactive security with SaaS Security Posture Administration.

Be part of Now

“The attacker went to terrific lengths to be untraceable by utilizing an open up data-sharing services to host the Python payload, adapting the fileless execution system to Python, and compiling an XMRig miner to embed its config to avoid touching the disk or making use of a revealing command line,” the scientists stated.

The enhancement will come as Sysdig thorough a new attack marketing campaign mounted by a danger actor regarded as SCARLETEEL that involves the abuse of AWS infrastructure to steal proprietary information and carry out illicit crypto mining.

Located this posting intriguing? Follow us on Twitter  and LinkedIn to browse far more special articles we submit.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «microsoft releases patches for 130 vulnerabilities, including 6 under active Microsoft Releases Patches for 130 Vulnerabilities, Including 6 Under Active Attack
Next Post: Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector chinese hackers deploy microsoft signed rootkit to target gaming sector»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.