The first instance of an exploit attack on the so-called "Looney Tunables" Linux privileged escalation vulnerability (CVE-2023-4911) was reported by researchers from Aqua Nautilus.In a blog post Nov. 3, the Aqua Nautilus researchers said they are “100% certain” that threat actor Kinsing was behind the attack, but they are not ready to disclose “how” just yet.Aqua Nautilus researchers said in a forthcoming report dedicated to Kinsing that they will unveil the enigma surrounding the case. They promised a comprehensive analysis, demonstrating the methodologies and evidence that let the Aqua team conclusively link the attack to the threat actor that has a storied history.To date, no research group has conclusively linked Kinsing to any named specific threat group, nation-state or otherwise. However, Kinsing represents a significant threat to cloud environments, particularly Kubernetes clusters, Docker APIs, Redis servers, and Jenkins servers, the Aqua Nautilus researchers said. Their ability to quickly adapt to new vulnerabilities and their persistent efforts to exploit misconfigurations make them a formidable adversary. The Kinsing threat actor has been actively involved in cryptojacking operations.
Cloud Security, Patch/Configuration Management, Threat Intelligence
Exploited ‘Looney Tunables’ Linux privileged escalation bug linked to Kinsing threat actor

(Adobe Stock)
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds