Wednesday, May 7, 2025
HomeHacksHackers Use Amazon’s AWS Computing Resources For Mining Bitcoins

Hackers Use Amazon’s AWS Computing Resources For Mining Bitcoins

Published on

SIEM as a Service

Follow Us on Google News

RedLock CSI team recently exposed hackers that were using organizations’ cloud computing resources to mine Bitcoins.

In their analysis, they found number of Kubernetes administrative consoles deployed on Amazon Web Services and hackers were executing a Bitcoin mining command from one of the Kubernetes containers.

The worst part is the access keys and secret tokens stored in plaintext within these unprotected Kubernetes instances. Hackers could use these to access critical infrastructure and cause more damage.

According to the report from AdGuard, Examining the website list more closely, we discovered that many of them are from the “gray zone”, mostly pirate TV and video sites, Torrent trackers and porn websites. Judging from these characteristics, we begin to wonder if browser mining is a bad thing and if it should be banned from the Internet.

In September, cybersecurity firm FireEye initially reported that a state-sponsored North Korean campaign was taking place to steal bitcoin from South Korean exchanges. Authorities have said that the attacks were in the form of spear phishing attempts. Since July, 25 employees across four digital currency exchanges have been targeted.

- Advertisement - Google News

Also Read Over 500 Million Users PC’s are Secretly Mining CryptoCurrency in Browser without Users Knowledge

In total, recent analyses by the IBM X-Force security team reveal that “cryptocurrency mining attacks aimed at enterprise networks jumped sixfold between January and August,” as reported by the MIT Technology Review. The team has also said that newer, alternative tokens to bitcoin are particularly popular, especially in the cases of Monera and zCash.

Over the last month alone, experts from Kaspersky labs have detected several large botnets designed to profit from concealed crypto mining including growing number of attempts.Security experts from Kaspersky detected more than 5,000+ computers with miner without user’s knowledge.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas

A former information technology manager has filed a whistleblower lawsuit alleging a major security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...

Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit

A major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated...