Published on: July 26, 2025
By: CyberDudeBivash Editorial Team
Category: Malware Analysis β’ AIβGenerated Threats β’ Cloud Native Security
Researchers from Aqua Securityβs Nautilus team have uncovered a novel Linux malware strainβKoskeβthat delivers AI-designed cryptominers and rootkits hidden within innocent-looking panda JPEG images. The malware exploits polyglot file abuse, executing shell scripts and C code appended to images entirely in memoryβevading traditional antivirus and disk-based detection.(turn0search0, turn0search3, turn0search2)
The attackers gain remote code execution through unsecured JupyterLab instances. Once inside, they download two panda JPEG files hosted on legitimate image platforms (e.g. OVH, Postimage, FreeImage). These files are polyglot filesβvalid JPEGs with malicious code tacked onto the end.(turn0search0, turn0search3)
These images are processed in memory:
.bashrc
, .bash_logout
, /etc/rc.local
, systemd service units, and cron jobs running every 30β―minutes or at reboot..so
), it uses LD_PRELOAD to intercept readdir()
and hide processes, files, and directories containing strings like βkoskeβ or βhideprocβ.(turn0search0, turn0search3)Koske hardens itself by:
/etc/resolv.conf
to use Google/Cloudflare resolvers and locking it with chattr +i
iptables
, resetting proxy variables, and brute-forcing working proxy connectivity using embedded modules/dev/shm
), minimizing disk footprint.(turn0search3)Koske evaluates host capabilities (CPU/GPU) and selects from 18 cryptocurrencies (including Monero, Ravencoin, Nexa, Tari), deploying optimized miners accordingly. If a pool fails, it automatically switches to an alternative option without human intervention.(turn0search3, turn0search9)
AquaSec notes hallmarks of LLM use: modular well-documented code, clean error-handling logic, adaptive proxy troubleshooting, and multilingual script comments (Serbian / Slovak) designed to confuse attribution.(turn0search0, turn0search7, turn0search3)
/tmp
and upload directories as noβexec..bashrc
, /etc/rc.local
, new systemd services, or regular cron jobs from unexpected users.LD_PRELOAD
use, unusual system services, and hidden directories or processes.Koske exemplifies the next wave of cyber threats: AI-generated, stealthy, adaptive Linux malware delivered through innocuous-looking images. Its combination of in-memory execution, rootkit persistence, and resource-intensive cryptomining makes it extremely dangerousβespecially in cloud or shared environments.Defenders must shift to behavioral detection, memory-level scanning, and execution hygiene enforcement to keep pace with emerging AI-powered malware.
Subscribe to our CyberMagazine at cyberdudebivash.com for weekly deep dives into AI threats, malware analysis, and actionable defense strategies.
Tags: #Koske #LinuxMalware #Cryptomining #PolyglotFiles #Rootkit #AIMalware #MemoryAttack #CloudSecurity #CyberDudeBivash