Kinsing malware exploiting misconfigured and exposed PostgreSQL servers

January 10, 2023

The Kinsing malware is now actively infringing Kubernetes clusters, according to Microsoft’s Defender, by utilizing known flaws in container images and malfunctioning, exposed PostgreSQL containers.

“Recently, we identified a widespread campaign of Kinsing that targeted vulnerable versions of WebLogic servers,” reads a report by Microsoft security researcher Sunders Bruskin.

“Attacks start with scanning of a wide range of IP addresses, looking for an open port that matches the WebLogic default port (7001).”

The most recent attack represents an increase in the use of two methods by Kinsing operators to gain initial access to a Linux server: exploiting a vulnerability in container images or misconfigured PostgreSQL database servers.

The attackers are now said to be exploiting PostgreSQL server misconfigurations to co-opt the Kinsing actor and gain an initial foothold, with the company observing a “large number of clusters” infected in this manner.

The misconfiguration is related to a trust authentication setting, which could be abused to connect to the servers without any authentication and achieve code execution if the option to accept connections from any IP address is enabled.

“In general, allowing access to a broad range of IP addresses is exposing the PostgreSQL container to a potential threat,” Bruskin explained.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn