Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Market News

Malware Targets PostgreSQL Databases for Crypto Mining

Written By:
Iyiola Adrian

Last updated: August 22, 2024 11:52 AM
Published August 22, 2024 4:58 AM
Share
Last updated: August 22, 2024 11:52 AM
Published August 22, 2024 4:58 AM
Malware Targets PostgreSQL Databases for Crypto Mining

A new type of malware called PG_MEM has been discovered that targets PostgreSQL, a popular database system that is widely used online.

According to Aqua, a cybersecurity company, takes advantage of weak passwords to install software that mines cryptocurrency, putting over 800,000 databases at risk.

Aqua Nautilus just uncovered PG_MEM—a stealthy new malware targeting PostgreSQL databases! 🚨 This crafty threat brute forces its way in, hides its tracks, and even mines cryptocurrency right under the radar.

Want to know how it works and, more importantly, how to stop it? 🤔…

— Aqua Security (@AquaSecTeam) August 21, 2024

PG_MEM works by trying to guess weak passwords to break into databases. Once it gains access, it creates a new user with high-level privileges. The malware then installs mining software and connects to a mining pool.

This means the infected database’s computing power is used to mine cryptocurrency, while the malware hides its presence and prevents other hackers from accessing the system.

Cryptojacking, where malware secretly uses a computer’s power to mine cryptocurrency, has become more common. Reports show that such attacks increased by 400% in the first half of 2023. This highlights the need for better security to protect against these types of threats.

To address this issue, some companies are offering solutions like Aethir’s decentralized cloud infrastructure. They use unused computing resources from data centers to provide affordable and scalable computing services, helping to reduce the risk of exploitation.

Also Read: Styx Stealer Malware Targets Cryptocurrency Users

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Iyiola - Crypto Journalist at The Crypto Times
By Iyiola Adrian
Follow:
Iyiola is an experienced crypto writer specializing in simplifying complex blockchain and cryptocurrency topics for a broad audience. With expertise in ICOs, DeFi, NFTs, and regulatory updates, he offers valuable insights to help readers make informed decisions.

Join Our Newsletter

Subscribe to get latest crypto news!

    ​

    Built with Kit

    Latest News

    Ice Open Network Breach Exposes User Data in Third-Party Hack
    Ice Open Network Breach Exposes User Data in Third-Party Hack
    India on Alert as ISKP Pushes AI Propaganda and Crypto Appeals
    India on Alert as ISKP Pushes AI Propaganda and Crypto Appeals
    BTC, ETH, XRP Flash Bullish Reversal Trendline Breaks Across Top 3
    BTC, ETH, XRP Flash Bullish Reversal: Trendline Breaks Across Top 3
    $21 Million on Lido EarnETH At Risk in Kelp DAO Exploit
    $21 Million on Lido EarnETH At Risk in KelpDAO Exploit
    Reabold Explores Bitcoin Mining Using UK Gas Field at West Newton
    Reabold Explores Bitcoin Mining Using UK Gas Field at West Newton

    Find Us on Socials

    Ad image

    You may also like

    Crypto Inflows Hit $1.4B as Bitcoin Leads Global Recovery Wave

    Crypto Inflows Hit $1.4B as Bitcoin Leads Global Recovery Wave

    Indian Authorities Uncover ₹6.82 Crore Crypto Scam in Yamunanagar

    Indian Authorities Uncover ₹6.82 Crore Crypto Scam in Yamunanagar

    ED Raids in Karnataka Bitcoin Scam Pull MLA’s Sons Into India Probe

    ED Raids in Karnataka Bitcoin Scam Pull MLA’s Sons Into India Probe

    Vercel Data Breach Exposes Customer Credentials After AI Tool Compromise

    Vercel Data Breach Exposes Customer Credentials After AI Tool Compromise

    The Crypto Times Logo PNG

    Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

    Stay Updated

    All News
    Exclusive
    Opinions
    Learn
    Podcasts

    Company

    About Us
    Our Authors
    Editorial Policy
    AI Policy
    Advertorial Policy

    Get In Touch

    Contact Us
    Career

    Find Us on Socials

    X-twitter Linkedin Telegram Youtube Instagram

    © 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

    DMCA.com Protection Status
    • Terms and Conditions
    • Disclaimer
    • Privacy Policy
    • Cookie policy
    Do Not Sell or Share My Personal Information