Identity, Cloud Security, Malware

AWS EC2 exploited in new cryptomining attacks

Amazon Web Services Elastic Computer Cloud implementations have been targeted by financially motivated Indonesian threat operation GUI-vil to facilitate cryptomining activities, The Hacker News reports. Initial access is achieved by GUI-vil by exploiting publicly exposed AWS keys or identifying GitLab instances that could be compromised with remote code execution bugs, with GUI-vil then proceeding to escalate privileges and conduct reconnaissance efforts while creating new users to conceal malicious activity, according to a report by Permiso's P0 Labs. Aside from establishing access keys for newly created identities in an effort to continue S3 Browser utilization, GUI-vil has also been developing login profiles for current users in a bid to avoid detection. "The group's primary mission, financially driven, is to create EC2 instances to facilitate their crypto mining activities. In many cases the profits they make from crypto mining are just a sliver of the expense the victim organizations have to pay for running the EC2 instances," said researchers.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds