Compromised IAM credentials drive AWS crypto mining campaign

Amazon has identified a new cryptocurrency mining operation on its AWS platform. The campaign exploits stolen IAM credentials and abuses services like ECS and EC2. Attackers use termination protection to maintain persistence.

Amazon Web Services (AWS) has disclosed details of a significant cryptocurrency mining campaign targeting its infrastructure. The operation relies on compromised Identity and Access Management (IAM) credentials to gain unauthorized access. Once inside, attackers deploy mining activities using Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) instances.

To ensure longevity, the malicious actors enable termination protection on the compromised instances, preventing easy shutdowns. This persistence mechanism allows the mining to continue undetected for extended periods. AWS emphasizes that such abuses highlight the importance of securing IAM credentials to protect cloud environments.

The campaign represents a growing trend in cryptojacking, where unauthorized computing resources are hijacked for mining digital currencies. Organizations using AWS are advised to monitor for unusual activity in their IAM policies and instance configurations. No specific timeline or victim details were provided in the report, but the incident underscores ongoing cybersecurity challenges in cloud computing.

相关文章

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
AI 生成的图像

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

由 AI 报道 AI 生成的图像

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

3 月 1 日,伊朗用无人机袭击了亚马逊网络服务公司在阿联酋的数据中心,破坏了该地区的数字服务。十天后,与伊朗伊斯兰革命卫队有关联的塔斯尼姆通讯社宣布,谷歌、微软、IBM、Nvidia、甲骨文和 Palantir 在以色列和海湾地区的办事处和基础设施为合法目标。

由 AI 报道

Amazon web services data centers in the united arab emirates and bahrain suffered damage from drone strikes over the weekend. The attacks disrupted power and caused fires and water damage at the facilities. The company is working with local authorities to recover while warning of delivery delays in the region.

A deceptive package on the PyPI repository has been found impersonating the popular SymPy library. This malicious software targets Linux systems, downloading and executing the XMRig cryptocurrency miner through in-memory techniques. Security researchers have highlighted the risks posed by such supply chain attacks in open-source ecosystems.

由 AI 报道

Cybersecurity experts are increasingly alarmed by how artificial intelligence is reshaping cybercrime, with tools like deepfakes, AI phishing, and dark large language models enabling even novices to execute advanced scams. These developments pose significant risks to businesses in the coming year. Published insights from TechRadar underscore the scale and sophistication of these emerging threats.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

由 AI 报道

The European Commission has disclosed a cyber attack that affected its cloud infrastructure hosting the Europa.eu websites. Officials stated that data was taken from the sites, and the incident has been contained while investigations continue. Bleeping Computer reported that hackers accessed over 350GB of data, including employee information.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝