Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Making Google Sans Flex

    2026 Apple introducing more ads to increase opportunity in search results

    Getting bitten by Intel’s poor naming scenes

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025
    • Business

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025

      PlayStation Portal’s Latest Update Proves Sony Needs a Real Handheld Console Again

      December 14, 2025
    • Crypto

      $3.16 Billion Crypto Options Expiry Puts Bitcoin and Ethereum’s Next Move in Question

      December 19, 2025

      How is Crypto VC Investment Trending in a Bearish Market?

      December 19, 2025

      US Crypto CLARITY Act Set for Senate Markup in January

      December 19, 2025

      Bitcoin, Ethereum, and XRP: Which Crypto Will Shine the Most in 2026?

      December 19, 2025

      US Inflation Cooled, So Why Did Bitcoin and Stocks Sell Off?

      December 19, 2025
    • Technology

      Making Google Sans Flex

      December 19, 2025

      2026 Apple introducing more ads to increase opportunity in search results

      December 19, 2025

      Getting bitten by Intel’s poor naming scenes

      December 19, 2025

      Reconstructed Commander Keen 1-3 Source Code

      December 19, 2025

      Noclip.website – A digital museum of video game levels

      December 19, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Business Technology»Amazon: Ongoing cryptomining campaign uses hacked AWS accounts
    Business Technology

    Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

    TechAiVerseBy TechAiVerseDecember 18, 2025No Comments3 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Amazon: Ongoing cryptomining campaign uses hacked AWS accounts
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

    Amazon’s AWS GuardDuty security team is warning of an ongoing crypto-mining campaign that targets its Elastic Compute Cloud (EC2) and Elastic Container Service (ECS) using compromised credentials for Identity and Access Management (IAM).

    The operation started on November 2nd and employed a persistence mechanism that extended mining operations and hindered incident responders.

    The threat actor used a Docker Hub image that was created at the end of October and had more than 100,000 pulls.

    The Amazon EC2 service lets users run virtual machines in AWS, while ECS allows running containerized applications (e.g., Docker apps) on the cloud platform.

    Planting crypto-miners on these instances allows threat actors to profit financially at the expense of AWS customers and Amazon, who must bear the burden of computational resource exhaustion.

    Amazon says that the attacker did not leverage a vulnerability but used valid credentials in customer accounts.

    Crypto-mining operations

    AWS said in a report released today that the attacker started cryptomining within 10 minutes of initial access, following reconnaissance of EC2 service quotas and IAM permissions.

    This was possible by registering a task definition pointing to the Docker Hub image yenik65958/secret, created on October 29, which included an SBRMiner-MULTI cryptominer and a startup script to launch it automatically when the container started.

    Each task was configured with 16,384 CPU units and 32GB of memory, and the desired count for ECS Fargate tasks was set to 10.

    Cryptomining diagram
    Source: Amazon

    On Amazon EC2, the attacker created two launch templates with startup scripts that automatically initiated cryptomining, along with 14 auto-scaling groups configured to deploy at least 20 instances each, with a maximum capacity of up to 999 machines.

    Novel persistence method

    Once the machines were running, the attacker enabled a setting that prevents administrators from remotely terminating them, forcing responders to explicitly disable the protection before shutting them down. This was likely introduced to delay response and maximize cryptomining profits.

    “An interesting technique observed in this campaign was the threat actor’s use of ModifyInstanceAttribute across all launched EC2 instances to disable API termination,” Amazon explains.

    “Although instance termination protection prevents accidental termination of the instance, it adds an additional consideration for incident response capabilities and can disrupt automated remediation controls,” the company says.

    After identifying the campaign, Amazon alerted affected customers about the cryptomining activity and the need to rotate the compromised IAM credentials.

    An Amazon spokesperson told BleepingComputer that: “AWS proactively identified this ongoing campaign and quickly alerted customers to the threat.”

    Also, the malicious Docker Hub image has been removed from the platform, but Amazon warns that the threat actor could deploy similar images under different names and publisher accounts.


    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleKuxiu’s S3 MagSafe power bank is bigger and better and probably won’t explode
    Next Article Zeroday Cloud hacking event awards $320,0000 for 11 zero days
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

    December 18, 2025

    Zeroday Cloud hacking event awards $320,0000 for 11 zero days

    December 18, 2025

    Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

    December 16, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025527 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025186 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202592 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202573 Views
    Don't Miss
    Technology December 19, 2025

    Making Google Sans Flex

    Making Google Sans FlexWhen Google Sans rolled out in 2018, designers were initially ecstatic. “It…

    2026 Apple introducing more ads to increase opportunity in search results

    Getting bitten by Intel’s poor naming scenes

    Reconstructed Commander Keen 1-3 Source Code

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Making Google Sans Flex

    December 19, 20250 Views

    2026 Apple introducing more ads to increase opportunity in search results

    December 19, 20251 Views

    Getting bitten by Intel’s poor naming scenes

    December 19, 20250 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Radiology AI software provider Gleamer expands into MRI with two small acquisitions

    March 12, 20250 Views

    EU Officials Warn US Stablecoin Push Could Undermine Euro Stability

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.