💞 #Gate Square Qixi Celebration# 💞
Couples showcase love / Singles celebrate self-love — gifts for everyone this Qixi!
📅 Event Period
August 26 — August 31, 2025
✨ How to Participate
Romantic Teams 💑
Form a “Heartbeat Squad” with one friend and submit the registration form 👉 https://www.gate.com/questionnaire/7012
Post original content on Gate Square (images, videos, hand-drawn art, digital creations, or copywriting) featuring Qixi romance + Gate elements. Include the hashtag #GateSquareQixiCelebration#
The top 5 squads with the highest total posts will win a Valentine's Day Gift Box + $1
Hackers Exploit Apache Flaw To Drop Linuxsys Cryptominer Payload
HomeNews* Researchers uncovered a new attack exploiting a known vulnerability in Apache HTTP Server to deploy the Linuxsys cryptocurrency miner.
The shell script automates the installation process and drops another script, “cron.sh,” which ensures the miner launches every time the system reboots. VulnCheck observed that some of the compromised sites also contain Windows malware files, indicating the campaign’s reach may extend beyond Linux systems. Attackers have previously exploited critical vulnerabilities, such as a flaw in OSGeo GeoServer GeoTools (CVE-2024-36401), for similar mining activities. Comments within the malware source code are written in Sundanese, suggesting a connection to Indonesia.
Other software vulnerabilities used in past attacks to deploy the miner include template injection in Atlassian Confluence (CVE-2023-22527), command injection in Chamilo LMS (CVE-2023-34960), and similar flaws in Metabase and Palo Alto firewalls (CVE-2024-0012 and CVE-2024-9474). “All of this indicates that the attacker has been conducting a long-term campaign, employing consistent techniques such as n-day exploitation, staging content on compromised hosts, and coin mining on victim machines,” VulnCheck reported.
In a separate incident, Kaspersky warned of a targeted attack against government servers in Asia through a custom malware called GhostContainer. The attackers may have exploited a remote code execution bug (CVE-2020-0688) in Microsoft Exchange Servers. This backdoor allows full access to compromised servers without connecting to external command centers, hiding instructions inside normal web requests, which increases stealth.
The campaigns demonstrate persistent targeting of publicly known software flaws and sophisticated tactics to maintain a low profile while carrying out mining and espionage operations.
Previous Articles: