Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Compromised IAM Credentials Power Massive AWS Crypto Mining Campaign
Identity

Compromised IAM Credentials Power Massive AWS Crypto Mining Campaign

userBy userDecember 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 16, 2025Ravi LakshmananMalware/threat detection

An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining.

The activity was first detected by Amazon’s managed threat detection service GuardDuty and its automated security monitoring systems on November 2, 2025, and employs never-before-seen persistence techniques to disrupt incident response and continue unimpeded, according to a new report shared by the tech giant ahead of publication.

“The attacker, operating from an external hosting provider, quickly enumerated resources and permissions before deploying cryptocurrency mining resources across ECS and EC2,” Amazon said. “The cryptocurrency miner was up and running within 10 minutes of the threat actor gaining initial access.”

The multi-stage attack chain essentially begins with an unknown attacker leveraging compromised IAM user credentials with administrator-like privileges to begin a discovery phase designed to probe the EC2 service quota environment and test privileges by calling the RunInstances API with the “DryRun” flag set.

Enabling this “DryRun” flag is important and intentional as it allows an attacker to verify IAM permissions without actually launching an instance. This avoids increased costs and minimizes forensic footprint. The ultimate goal of this step is to determine whether the target infrastructure is suitable for deploying the miner program.

cyber security

The infection progresses to the next stage, where the threat actor calls CreateServiceLinkedRole and CreateRole to create an autoscaling group and an IAM role for AWS Lambda, respectively. When the role is created, the “AWSLambdaBasicExecutionRole” policy is attached to the Lambda role.

In observed activity to date, threat actors are said to have created dozens of ECS clusters across environments, and in some cases more than 50 ECS clusters in a single attack.

“They then used the malicious DockerHub image yenik65958/secret:user to call RegisterTaskDefinition,” Amazon said. “Using the same strings used to create the cluster, the attacker used the task definition to create a service and begin crypto mining on the ECS Fargate nodes.”

The DockerHub image, which has since been removed, was configured to run a shell script and begin cryptocurrency mining using the RandomVIREL mining algorithm as soon as it was deployed. Additionally, threat actors have been observed creating autoscaling groups configured to scale from 20 to 999 instances in order to exploit EC2 service quotas and maximize resource consumption.

EC2 activities target both high-performance GPU and machine learning instances as well as compute, memory, and general-purpose instances.

What makes this campaign stand out is the use of the ModifyInstanceAttribute action with the ‘disableApiTermination’ parameter set to ‘True’. This prevents you from terminating your instance using the Amazon EC2 console, command line interface, or API. This will require victims to re-enable API termination before deleting the affected resource.

“Instance termination protection can impair incident response capabilities and disrupt automated remediation controls,” Amazon said. “This methodology demonstrates an understanding of common security response procedures and the intent to maximize the duration of mining operations.”

This is not the first time security risks associated with ModifyInstanceAttribute have been revealed. In April 2024, security researcher Harsha Koushik demonstrated a proof of concept (PoC) detailing how this action could be exploited to take over an instance, steal instance role credentials, and even seize control of an entire AWS account.

Additionally, this attack involves creating a Lambda function that can be invoked by any principal and IAM user “user-x1x2x3x4” with the AWS managed policy “AmazonSESFullAccess” attached, allowing the attacker full access through Amazon Simple Email Service (SES) to potentially conduct phishing attacks.

cyber security

To protect yourself from this threat, Amazon recommends that AWS customers follow these steps:

Enforce strong identity and access management controls Implement temporary credentials instead of long-term access keys Use multi-factor authentication (MFA) for all users Restrict access by enforcing the principle of least privilege (PoLP) on IAM principals Add security controls for containers to scan for suspicious images Monitor for unusual CPU allocation requests in ECS task definitions Log events across AWS services using AWS CloudTrail Verify GuardDuty is enabled to facilitate automated response workflows

“Threat actors’ use of multiple scripted computing services, combined with new persistence techniques, represents a significant advancement in cryptocurrency mining attack techniques.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCity-sized ‘cosmic butterflies’ carved into Mars’ surface contain traces of ancient water
Next Article Polar bears in southern Greenland are ‘using jump genes to rapidly rewrite their DNA’ to survive melting sea ice
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.