A wave of cyberattacks targeting PostgreSQL servers has recently shaken the cybersecurity world. Over 1,500 servers have been compromised in a sophisticated fileless cryptocurrency mining campaign. This attack highlights the persistent vulnerabilities of exposed databases and underscores the crucial importance of cybersecurity in today’s digital ecosystem.
The mechanisms behind the exploitation of compromised PostgreSQL
Since the beginning of 2025, a campaign orchestrated by the threat group JINX-0126 has targeted vulnerable PostgreSQL instances, exploiting security flaws to install cryptocurrency miners. According to Hfrance, this campaign relies on the use of malware named PG_MEM, initially detected by Aqua Security in August 2024.

The attackers have refined their techniques, deploying unique binaries for each target and executing fileless payloads. This method makes detection by solutions protecting cloud workloads based solely on file reputation much more difficult. Wiz researchers, Avigayil Mechtinger, Yaara Shriki, and Gili Tikochinski, explained that the evolution of these techniques allows criminals to remain undetectable for longer periods.
- Deployment of binaries with unique hashes
- Execution of fileless miners using fileless techniques
- Using the SQL COPY … FROM PROGRAM command to execute shell commands
- Installation of persistence scripts and cryptocurrency miners
| Technique | Description |
|---|---|
| Deployment of unique binaries | Each target receives a different binary to avoid detection by antivirus signatures. |
| Fileless execution | Using RAM to execute payloads, making persistent files difficult to identify. |
Exploitation of PostgreSQL vulnerabilities
Compromised PostgreSQL servers are often publicly exposed with weak or predictable credentials, facilitating unauthorized access. Once access is gained, attackers perform preliminary reconnaissance before deploying malicious payloads. According to CSIRT Bénin, several vulnerabilities, including SQL injections, have been exploited in this campaign.
One of the most notable techniques used by cybercriminals is the abuse of the SQL COPY … FROM PROGRAM command, allowing the arbitrary execution of shell commands directly on the compromised server. This method is particularly effective at bypassing traditional security mechanisms and installing cryptocurrency miners like XMRig.
- Using SQL commands to access the host system
- Deployment of malicious Base64-encoded scripts
- Installation of obfuscated binaries to mask mining activities
| Step | Description |
|---|---|
| Preliminary reconnaissance | Identification of weaknesses and vulnerable configurations of the PostgreSQL server. |
| Payload deployment | Installation of malicious scripts and cryptocurrency miners. |
This innovative approach highlights the need for database administrators to strengthen the security of their systems and to actively monitor for suspicious activities.
The massive impact of compromised servers on cryptocurrency mining
With over 1,500 servers affected, the campaign has had a significant impact on the cryptocurrency ecosystem. Wiz reports that this attack has allowed cybercriminals to generate substantial amounts of cryptocurrencies using the computing power of compromised servers while evading detection through advanced camouflage techniques.

Cryptocurrency mining through compromised servers provides attackers with a passive and illegal source of income. By exploiting the processing power of vulnerable PostgreSQL servers, they can mine digital currencies like Monero (XMR) without drawing the attention of the server owners or cybersecurity solutions. This type of fraud has repercussions not only financially but also on the performance and reliability of the affected infrastructures.
- Increased energy consumption of servers
- Degradation of performance and instability of applications
- Increased risk of hardware failures
- Loss of trust from users and clients
| Consequence | Impact |
|---|---|
| Increased energy consumption | Miners exploit CPU resources, increasing energy costs. |
| Performance degradation | Server resources are diverted, affecting legitimate services. |
Economic and technological repercussions
The massive exploitation of PostgreSQL servers has generated substantial profits for cybercriminals. Wiz has identified three distinct wallets, each linked to about 550 cryptocurrency miners, cumulatively accounting for over 1,500 compromised machines. This complex orchestration demonstrates a high level of organization and capacity to manage a vast network of infected servers.
Microsoft strengthens PostgreSQL security on Azure has been a direct response to this threat, with patches aimed at closing the vulnerabilities exploited by attackers.
Companies that are victims of this attack suffer not only financial losses due to cryptocurrency theft but also additional costs for remediation and securing their systems. Furthermore, the reputation of organizations can be severely damaged, leading to a decrease in trust from clients and partners.
- Direct financial losses related to unauthorized mining
- Remediation and system security costs
- Impact on reputation and trust from clients
- Increased risk of future targeted attacks
| Factor | Detail |
|---|---|
| Financial losses | Stolen cryptocurrencies valued at several million euros. |
| Remediation costs | Investments in new security solutions and audits. |
This scenario highlights the importance of a proactive approach to cybersecurity, including continuous monitoring and regular system updates to prevent such attacks.
The responses of the cybersecurity community to the threat
In the face of this sophisticated campaign, the cybersecurity community has intensified its efforts to counter attacks and protect critical infrastructures. Companies like Wiz and Aqua Security are collaborating closely to analyze the tactics employed and develop effective countermeasures.

Wiz has played a key role in identifying and tracing the threat group JINX-0126, providing valuable insights into their methods and objectives. Additionally, initiatives like postgreSQL Security are multiplying to strengthen the resilience of databases against such intrusions.
- Development of security patches for PostgreSQL
- Improvement of authentication and access management protocols
- Implementation of advanced detection systems to identify abnormal behavior
- International collaborations to share intelligence on threats
| Initiative | Description |
|---|---|
| Security patches | Release of updates to address exploited vulnerabilities. |
| Advanced detection | Use of artificial intelligence to detect anomalies. |
At the same time, government organizations like CSIRT Bénin have intensified their efforts to educate database administrators on best security practices and raise awareness of risks associated with weak credentials and default configurations.
Global cooperation and information sharing are essential to counter the ever-evolving cyber threats. Businesses and institutions are encouraged to adopt a layered security approach, integrating both preventive measures and rapid incident response strategies.
Best practices for securing PostgreSQL instances
To safeguard against such attacks, it is crucial to adopt robust database security practices. Here are some key recommendations:
- Use complex and unique passwords for each PostgreSQL instance
- Limit access to databases using strict access controls
- Regularly update PostgreSQL to apply the latest security patches
- Configure firewalls to restrict incoming connections to trusted IP addresses
- Continuously monitor for suspicious activities and unauthorized access attempts
| Practice | Description |
|---|---|
| Complex passwords | Use combinations of letters, numbers, and symbols to strengthen security. |
| Access controls | Restrict access to databases to authorized users only. |
Adopting these best practices significantly reduces the risk of exploitation and protects critical resources from cyberattacks.
The future of cybersecurity in the face of growing threats
With the rise of attacks targeting databases and cloud infrastructures, the future of cybersecurity relies on innovation and collaboration. Companies must invest more in cutting-edge technologies and train their teams to anticipate and respond effectively to new threats.
AI-based solutions and machine learning are playing an increasingly important role in the proactive detection of cyber threats. By analyzing massive volumes of data, these technologies can identify unusual patterns and trigger alerts before attackers can cause significant harm.
- Integration of AI for more accurate anomaly detection
- Development of automated incident response systems
- Strengthening the security of cloud infrastructures
- Promotion of cybersecurity awareness and training
| Trend | Impact |
|---|---|
| Artificial Intelligence | Improvement of threat detection and prevention. |
| Automation | Reduction of response time to security incidents. |
Moreover, international cooperation and information sharing between public and private entities will be essential to counter global cyber threats. Joint initiatives, discussion forums, and strategic partnerships will strengthen the resilience of infrastructures and create a safer digital environment for all.
As cybercriminals refine their techniques, the cybersecurity community must also evolve and adapt, adopting innovative approaches to anticipate and neutralize emerging threats.
Technological innovations in the service of cybersecurity
The landscape of cybersecurity is constantly evolving, with emerging new technologies offering opportunities to strengthen defenses against attacks. Among these innovations, blockchain solutions for securing transactions and access, as well as AI-based identity management platforms, stand out as promising tools.
- Use of blockchain for secure and immutable records
- Identity management with advanced multifactor authentication
- Deployment of smart honeypots to trap attackers
- Adoption of behavioral analysis to detect anomalies
| Innovation | Advantage |
|---|---|
| Blockchain | Ensures data integrity and prevents tampering. |
| Smart honeypots | Diverts and analyzes attacker tactics. |
These technologies, combined with a comprehensive and proactive security strategy, will better protect PostgreSQL servers and other critical infrastructures against ever-evolving cyber threats.