A new breed of cryptojacking malware is rewriting the playbook on stealth attacks. Dubbed Soco404, this campaign leverages 404 error pages, misconfigured PostgreSQL servers, and compromised web infrastructure to mine cryptocurrency across both Linux and Windows systems—without raising traditional red flags.
Malware Hiding in Plain Sight: The 404 Trick
Unlike conventional malware droppers or phishing tactics, Soco404 embeds its Base64-encoded payloads directly inside 404 error pages. These payloads are cleverly disguised within normal-looking HTML tags, making them nearly invisible to standard URL filtering tools and static scanners.
Researchers at Wiz.io discovered that these error pages, hosted on Google Sites and compromised Apache Tomcat servers, serve as the delivery mechanism. Once opened by unsuspecting or automated processes, they quietly detonate cryptomining scripts on the target system—siphoning CPU cycles for profit.
Evolution of a Miner Bot
Soco404 is not entirely new. Investigators believe it evolved from earlier miner bot campaigns that exploited:
Weak Tomcat credentials
Unpatched Atlassian Confluence instances
However, the latest iteration—surfacing in mid-2025—has refined its tactics and broadened its reach.
Exploiting PostgreSQL: The Power of COPY FROM PROGRAM
A standout technique in Soco404’s arsenal is the abuse of PostgreSQL’s COPY FROM PROGRAM feature, which allows execution of system commands through the database interface. Attackers scan for publicly exposed PostgreSQL services—a risk that affects nearly one-third of cloud deployments.
Once inside a vulnerable instance, the malware uses this feature to pivot laterally across environments, spinning up new miners in Linux and Windows hybrid estates.
Infection Path and Persistence
Beyond cloud databases, the adversary uses already-compromised web servers as infrastructure, allowing them to blend into legitimate traffic. Some of these servers include Korean transportation websites, which now silently serve:
soco.shfor Linux systemsok.exefor Windows systems
Once executed, the malware:
Deletes itself to hinder forensic analysis
Masquerades as system processes like
sd-pam,kworker/R-rcu_p, or randomly named Windows servicesSchedules cron jobs and shell init hooks
Disables Windows Event Logs to avoid detection
Signs of Infection
This campaign is designed to operate below the radar. Most victims don’t realize they’re infected until they notice:
A gradual spike in electricity usage
Performance degradation
No alerts or alarms on security dashboards
The attackers’ goal is to quietly mine cryptocurrency at scale, avoiding immediate shutdown or attention.
Defensive Measures
To reduce exposure to Soco404 and similar campaigns, organizations should:
Audit public-facing services, especially PostgreSQL and Tomcat instances
Disable COPY FROM PROGRAM in PostgreSQL when not explicitly needed
Patch known vulnerabilities in web servers and frameworks
Monitor for unusual CPU usage spikes and resource drains
Inspect web server traffic for unexpected error page activity or embedded scripts
Soco404 exemplifies the evolving nature of cryptojacking threats—where simplicity, stealth, and system misconfiguration combine for devastating effect. By hijacking 404 pages and exploiting overlooked database features, the campaign highlights just how far threat actors are willing to go to remain undetected.
As always, proactive monitoring, tight configurations, and threat intelligence are critical in staying ahead of modern malware campaigns like Soco404.

