-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kdevtmpfsi malware found in postgres latest image #1054
Comments
This is an unfortunate consequence of having a public-facing instance with a compromised (or simple) password. See also: |
I wonder how is someone able to install mining malware if they only can access your database via psql console? |
@zedefi :
Attack Sequence: open port + brute force attack + |
Well said @ImreSamu, Yes thats actually true, i faced the same issue because of exposing database ports to the internet, |
i have the same issue because having a weak password. changing the password to a strong one, works for me. |
One thing I found useful was to |
I noticed that
/tmp/kdevtmpfsi
is using all cpu resource. so I tried to remove it but it was in/var/lib/docker/overlay2/.../.../merged
. I stopped PostgreSQL container because it was the only running container in the server.The text was updated successfully, but these errors were encountered: