Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Public training opens the door to crypto mining in Fortune 500 cloud environments

A green digital economy can improve health and sustainability

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Public training opens the door to crypto mining in Fortune 500 cloud environments
Identity

Public training opens the door to crypto mining in Fortune 500 cloud environments

userBy userFebruary 11, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

hacker newsFebruary 11, 2026Identity Security/Threat Exposure

Deliberately vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools like OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, so it helps to learn how common attack techniques work in a controlled environment.

The problem is not the applications themselves, but how they are often deployed and maintained in real-world cloud environments.

Pentera Labs investigated how training and demo applications are used across cloud infrastructure and identified recurring patterns. This meant that applications intended for use in isolated labs were frequently found exposed to the public internet, running within active cloud accounts, and connected to cloud identities with broader access than necessary.

Developmental patterns observed in research

Pentera Labs research found that these applications are often deployed with default configurations, minimal isolation, and overly permissive cloud roles. Our investigation found that many of these exposed training environments are directly connected to active cloud identities and privileged roles, allowing attackers to go far beyond the vulnerable application itself and potentially penetrate a customer’s broader cloud infrastructure.

In these scenarios, a single public training application serves as a starting point. Once attackers have access to connected cloud identities and privileged roles, they are no longer constrained by the original application or host. Instead, they can interact with other resources within the same cloud environment, potentially significantly increasing the scope and potential impact of a breach.

As part of the study, Pentera Labs examined nearly 2,000 live public training application instances, nearly 60% of which were hosted on customer-managed infrastructure running on AWS, Azure, or GCP.

Evidence of active abuse

The exposed training environments identified during the investigation were not simply misconfigured. Pentera Labs has observed clear evidence that attackers are indeed actively exploiting this exposure.

Across a broad dataset of publicly available training applications, we found that approximately 20% of instances contained artifacts deployed by malicious actors, including cryptocurrency mining activities, web shells, and persistence mechanisms. These artifacts were indicative of previous compromises and continued exploitation of exposed systems.

The presence of active cryptomining and persistence tools indicates that public training applications are not only discoverable, but are already being exploited at scale.

Scope of influence

The exposure and exploited environments identified during the study were not limited to small or isolated test systems. Pentera Labs has observed this deployment pattern across cloud environments associated with Fortune 500 companies and major cybersecurity vendors such as Palo Alto, F5, and Cloudflare.

Although individual circumstances differed, the basic pattern remained consistent. This means that a training or demo application was deployed without sufficient isolation, remained publicly accessible, and was connected to a privileged cloud identity.

why is this important

Training and demo environments are often treated as low-risk or temporary assets. As a result, they are often excluded from standard security monitoring, access reviews, and lifecycle management processes. Over time, these environments can remain exposed long after their original purpose has passed.

According to the study, exploitation does not require zero-day vulnerabilities or sophisticated attack techniques. Default credentials, known weaknesses, and public exposure were enough to turn the training application into an entry point for widespread cloud access.

Labeling an environment “training” or “testing” does not reduce that risk. When these systems are exposed to the internet and connected to privileged cloud identities, they become part of an organization’s effective attack surface.

Read the full Pentera Labs research blog and join us for a live webinar on February 12th to learn more about the methodology, discovery process, and real-world applications observed during this study.

This article was written by Noam Yaffe, Senior Security Researcher at Pentera Labs. For questions or discussions, please contact labs@penera.io.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA green digital economy can improve health and sustainability
user
  • Website

Related Posts

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026

SSHStalker botnet uses IRC C2 to control Linux systems via legacy kernel exploits

February 11, 2026

North Korea-linked UNC1069 uses AI decoys to attack crypto organizations

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Public training opens the door to crypto mining in Fortune 500 cloud environments

A green digital economy can improve health and sustainability

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

UKSA internship leads young people to space careers

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.