CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

AWS Crypto Mining Campaign Exploits Compromised IAM Credentials

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A campaign targeting AWS customers uses compromised IAM credentials to deploy cryptocurrency mining operations. The attackers employ sophisticated persistence techniques, including disabling instance termination, to evade detection and maximize resource consumption. The activity was first detected on November 2, 2025, and involves the creation of multiple ECS clusters and Lambda functions to facilitate mining operations. The attackers leverage the 'DryRun' flag to validate permissions without incurring costs, and use the 'ModifyInstanceAttribute' action to prevent instance termination. The campaign also involves the creation of autoscaling groups to exploit EC2 service quotas and maximize resource consumption.

Timeline

  1. 16.12.2025 18:35 1 articles · 5h ago

    AWS Crypto Mining Campaign Detected on November 2, 2025

    The campaign targeting AWS customers using compromised IAM credentials was first detected on November 2, 2025. The attackers employ sophisticated persistence techniques, including disabling instance termination, to evade detection and maximize resource consumption. The activity involves the creation of multiple ECS clusters and Lambda functions to facilitate mining operations.

    Show sources

Information Snippets