Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Real 2025 PostgreSQL cryptojacking incident and AI-assisted recovery (substack.com)
1 point by levelZero 11 days ago | hide | past | favorite | 1 comment




A dev laptop running Ubuntu 24.04 got hit by a classic PostgreSQL cryptojacking attack while on public Wi-Fi (port 5432 exposed, UFW temporarily off). Detection started with fan noise → btop tree view revealed 70-99% CPU under the postgres user. The recovery was fully scripted, transparent, and driven by a local coding agent (Codex-Max-5.2) turned into a paranoid remediation specialist via a custom AGENTS.md directive. Highlights:

Generated dozens of timestamped audit/cleanup scripts Captured rogue sshd binary → 24/64 detections on VT as Linux trojan/rootkit hider Ended with UFW timed rules, auditd watches, LAN-only services

Full play-by-play, verbatim scripts, and takeaways — no hype, just level zero truth.

https://open.substack.com/pub/layerzero0/p/surviving-a-2025-...

Would love feedback from anyone who's dealt with Postgres miners or AI-assisted IR.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: