radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Hackers exploit RCE flaws in Qinglong task scheduler for cryptomining

sourceBleeping Computer
calendar_todayApril 29, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Hackers Exploit Qinglong RCE Flaws for Cryptomining

Summary

Hackers are actively exploiting remote code execution (RCE) vulnerabilities in the Qinglong task scheduler to install cryptominers on compromised servers. These attacks target developers using the open-source tool, bypassing authentication mechanisms.

Key Points

  • Two authentication bypass vulnerabilities have been identified in the Qinglong task scheduler.
  • These vulnerabilities are being exploited to deploy cryptomining software on developers' servers.
  • The exploitation involves remote code execution, allowing attackers to bypass security measures.
  • The vulnerabilities are present in the open-source version of Qinglong, a task scheduling tool.

Analysis

The exploitation of Qinglong's RCE vulnerabilities highlights the critical need for developers to secure open-source tools. With cryptomining attacks on the rise, attackers are leveraging these flaws to gain unauthorized access to servers, emphasizing the importance of regular updates and patches. The open-source nature of Qinglong makes it a widespread target, increasing the potential impact of these vulnerabilities.

Conclusion

IT professionals should immediately review their use of the Qinglong task scheduler and apply any available patches or mitigations to secure their systems. Regular monitoring and updating of open-source tools are essential to prevent unauthorized access and exploitation.