Compromised IAM credentials drive AWS crypto mining campaign

Amazon has identified a new cryptocurrency mining operation on its AWS platform. The campaign exploits stolen IAM credentials and abuses services like ECS and EC2. Attackers use termination protection to maintain persistence.

Amazon Web Services (AWS) has disclosed details of a significant cryptocurrency mining campaign targeting its infrastructure. The operation relies on compromised Identity and Access Management (IAM) credentials to gain unauthorized access. Once inside, attackers deploy mining activities using Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) instances.

To ensure longevity, the malicious actors enable termination protection on the compromised instances, preventing easy shutdowns. This persistence mechanism allows the mining to continue undetected for extended periods. AWS emphasizes that such abuses highlight the importance of securing IAM credentials to protect cloud environments.

The campaign represents a growing trend in cryptojacking, where unauthorized computing resources are hijacked for mining digital currencies. Organizations using AWS are advised to monitor for unusual activity in their IAM policies and instance configurations. No specific timeline or victim details were provided in the report, but the incident underscores ongoing cybersecurity challenges in cloud computing.

관련 기사

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
AI에 의해 생성된 이미지

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

AI에 의해 보고됨 AI에 의해 생성된 이미지

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

3월 1일, 이란은 드론으로 아랍에미리트에 있는 Amazon Web Services 데이터 센터를 공격하여 이 지역의 디지털 서비스를 중단시켰습니다. 열흘 후, 이란의 IRGC와 연계된 타스님 통신은 이스라엘과 걸프 지역에 있는 구글, 마이크로소프트, IBM, 엔비디아, 오라클, 팔란티르의 사무실과 인프라를 합법적인 공격 대상이라고 선언했습니다.

AI에 의해 보고됨

Amazon web services data centers in the united arab emirates and bahrain suffered damage from drone strikes over the weekend. The attacks disrupted power and caused fires and water damage at the facilities. The company is working with local authorities to recover while warning of delivery delays in the region.

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

AI에 의해 보고됨

Cybersecurity experts are increasingly alarmed by how artificial intelligence is reshaping cybercrime, with tools like deepfakes, AI phishing, and dark large language models enabling even novices to execute advanced scams. These developments pose significant risks to businesses in the coming year. Published insights from TechRadar underscore the scale and sophistication of these emerging threats.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

AI에 의해 보고됨

The European Commission has disclosed a cyber attack that affected its cloud infrastructure hosting the Europa.eu websites. Officials stated that data was taken from the sites, and the incident has been contained while investigations continue. Bleeping Computer reported that hackers accessed over 350GB of data, including employee information.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부