PULSE NAME
Untangling a Linux Incident With an OpenAI Twist (Part 2)
WHITE AlienVault 2026-04-22 Modified: 2026-04-23
7
IOCs
LOW VOLUME
A Linux endpoint was simultaneously compromised by at least two distinct threat actors while the developer user relied on OpenAI's Codex AI agent for security remediation. Actor A deployed a cryptominer mining Monero to a private pool. Actor B installed a multi-revenue botnet including XMRig mining, residential proxy services, and bandwidth-selling components with eight different persistence mechanisms. Actor C, potentially affiliated with Actor B, executed mass data exfiltration of 15 categories including SSH keys, cloud credentials, and API tokens. The threat actors exploited CVE-2025-55182 (React2Shell) affecting Next.js and React applications. While Codex identified some threats, it lacked contextual awareness and privileged access needed for comprehensive incident response, creating additional noise that complicated SOC investigation. The endpoint was ultimately secured through managed EDR telemetry and expert SOC analysis.
Indicators of Compromise (7)
All CVE FileHash-SHA256 IPv4 domain
TYPEINDICATORDESCRIPTIONCREATED
CVE CVE-2025-30406 2026-04-22
CVE CVE-2025-31151 2026-04-22
CVE CVE-2025-55182 2026-04-22
FileHash-SHA256 781c19b56fbdb17284707f9026e107f639e5447df7df3b248a5d5a50c4b0806c 2026-04-22
IPv4 147.45.41.25 2026-04-22
IPv4 62.60.246.210 2026-04-22
domain 0x1x2x3.top 2026-04-22