Compromised IAM credentials drive AWS crypto mining campaign

Amazon has identified a new cryptocurrency mining operation on its AWS platform. The campaign exploits stolen IAM credentials and abuses services like ECS and EC2. Attackers use termination protection to maintain persistence.

Amazon Web Services (AWS) has disclosed details of a significant cryptocurrency mining campaign targeting its infrastructure. The operation relies on compromised Identity and Access Management (IAM) credentials to gain unauthorized access. Once inside, attackers deploy mining activities using Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) instances.

To ensure longevity, the malicious actors enable termination protection on the compromised instances, preventing easy shutdowns. This persistence mechanism allows the mining to continue undetected for extended periods. AWS emphasizes that such abuses highlight the importance of securing IAM credentials to protect cloud environments.

The campaign represents a growing trend in cryptojacking, where unauthorized computing resources are hijacked for mining digital currencies. Organizations using AWS are advised to monitor for unusual activity in their IAM policies and instance configurations. No specific timeline or victim details were provided in the report, but the incident underscores ongoing cybersecurity challenges in cloud computing.

Labaran da ke da alaƙa

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
Hoton da AI ya samar

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

An Ruwaito ta hanyar AI Hoton da AI ya samar

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

A prolonged downturn in cryptocurrency has rendered Bitcoin mining unprofitable for many operators, leading them to repurpose their energy-intensive infrastructure for artificial intelligence applications. Companies like IREN Ltd. are betting on the growing demand for AI data centers. This pivot highlights the overlapping needs of crypto mining and AI computing.

An Ruwaito ta hanyar AI

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

An Ruwaito ta hanyar AI

A major outage at Amazon Web Services' US-EAST-1 region in northern Virginia caused widespread internet disruptions on Monday morning, October 20, 2025. DNS resolution issues affected numerous platforms, including Amazon's own services and third-party apps. The incident highlighted vulnerabilities in cloud infrastructure.

Fy energy has launched a cloud mining platform aimed at simplifying cryptocurrency mining for everyday users. The service highlights compliance measures, various contract options, and a structured earnings model to make the process accessible.

An Ruwaito ta hanyar AI

Ethereum's daily transactions reached an all-time high of over 2.8 million on January 16, largely driven by a widespread address poisoning scam. These attacks, which involve sending tiny crypto amounts from deceptive addresses, are intensifying amid recent network upgrades. Security experts warn that without improved wallet safeguards, users remain vulnerable to significant losses.

 

 

 

Wannan shafin yana amfani da cookies

Muna amfani da cookies don nazari don inganta shafin mu. Karanta manufar sirri mu don ƙarin bayani.
Ƙi