Compromised IAM credentials drive AWS crypto mining campaign

Amazon has identified a new cryptocurrency mining operation on its AWS platform. The campaign exploits stolen IAM credentials and abuses services like ECS and EC2. Attackers use termination protection to maintain persistence.

Amazon Web Services (AWS) has disclosed details of a significant cryptocurrency mining campaign targeting its infrastructure. The operation relies on compromised Identity and Access Management (IAM) credentials to gain unauthorized access. Once inside, attackers deploy mining activities using Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) instances.

To ensure longevity, the malicious actors enable termination protection on the compromised instances, preventing easy shutdowns. This persistence mechanism allows the mining to continue undetected for extended periods. AWS emphasizes that such abuses highlight the importance of securing IAM credentials to protect cloud environments.

The campaign represents a growing trend in cryptojacking, where unauthorized computing resources are hijacked for mining digital currencies. Organizations using AWS are advised to monitor for unusual activity in their IAM policies and instance configurations. No specific timeline or victim details were provided in the report, but the incident underscores ongoing cybersecurity challenges in cloud computing.

相关文章

Illustration of a Linux computer screen highlighting Amazon WorkSpaces vulnerability CVE-2025-12779, with security alert and hacker elements, for a news article on AWS security flaw.
AI 生成的图像

Amazon discloses Linux WorkSpaces vulnerability in authentication tokens

由 AI 报道 AI 生成的图像

Amazon Web Services has revealed a security flaw in its WorkSpaces client for Linux that allows local attackers to extract authentication tokens and access other users' virtual desktops. The vulnerability, CVE-2025-12779, affects client versions from 2023.0 to 2024.8 and carries a CVSS score of 8.8. AWS urges immediate upgrades to version 2025.0 or later to mitigate the risk.

A prolonged downturn in cryptocurrency has rendered Bitcoin mining unprofitable for many operators, leading them to repurpose their energy-intensive infrastructure for artificial intelligence applications. Companies like IREN Ltd. are betting on the growing demand for AI data centers. This pivot highlights the overlapping needs of crypto mining and AI computing.

由 AI 报道

A 2022 data breach at password manager LastPass has resulted in prolonged cryptocurrency thefts, according to blockchain intelligence firm TRM Labs. The incident involved stolen user vaults that facilitated around $35 million in losses extending into 2025.

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

由 AI 报道

A major outage at Amazon Web Services' US-EAST-1 region in northern Virginia caused widespread internet disruptions on Monday morning, October 20, 2025. DNS resolution issues affected numerous platforms, including Amazon's own services and third-party apps. The incident highlighted vulnerabilities in cloud infrastructure.

Fy energy has launched a cloud mining platform aimed at simplifying cryptocurrency mining for everyday users. The service highlights compliance measures, various contract options, and a structured earnings model to make the process accessible.

由 AI 报道

Ethereum's daily transactions reached an all-time high of over 2.8 million on January 16, largely driven by a widespread address poisoning scam. These attacks, which involve sending tiny crypto amounts from deceptive addresses, are intensifying amid recent network upgrades. Security experts warn that without improved wallet safeguards, users remain vulnerable to significant losses.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝