Tuesday, November 5, 2024
HomeHacksHackers Use Amazon’s AWS Computing Resources For Mining Bitcoins

Hackers Use Amazon’s AWS Computing Resources For Mining Bitcoins

Published on

Malware protection

RedLock CSI team recently exposed hackers that were using organizations’ cloud computing resources to mine Bitcoins.

In their analysis, they found number of Kubernetes administrative consoles deployed on Amazon Web Services and hackers were executing a Bitcoin mining command from one of the Kubernetes containers.

The worst part is the access keys and secret tokens stored in plaintext within these unprotected Kubernetes instances. Hackers could use these to access critical infrastructure and cause more damage.

According to the report from AdGuard, Examining the website list more closely, we discovered that many of them are from the “gray zone”, mostly pirate TV and video sites, Torrent trackers and porn websites. Judging from these characteristics, we begin to wonder if browser mining is a bad thing and if it should be banned from the Internet.

In September, cybersecurity firm FireEye initially reported that a state-sponsored North Korean campaign was taking place to steal bitcoin from South Korean exchanges. Authorities have said that the attacks were in the form of spear phishing attempts. Since July, 25 employees across four digital currency exchanges have been targeted.

- Advertisement - SIEM as a Service

Also Read Over 500 Million Users PC’s are Secretly Mining CryptoCurrency in Browser without Users Knowledge

In total, recent analyses by the IBM X-Force security team reveal that “cryptocurrency mining attacks aimed at enterprise networks jumped sixfold between January and August,” as reported by the MIT Technology Review. The team has also said that newer, alternative tokens to bitcoin are particularly popular, especially in the cases of Monera and zCash.

Over the last month alone, experts from Kaspersky labs have detected several large botnets designed to profit from concealed crypto mining including growing number of attempts.Security experts from Kaspersky detected more than 5,000+ computers with miner without user’s knowledge.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor IntelBroker Claims Leak of Nokia’s Source Code

The threat actor known as IntelBroker, in collaboration with EnergyWeaponUser, has claimed responsibility for...

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...