• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 72000 (72k) monthly views (unique) and 272000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

Amazon Warns Hackers Are Using Stolen AWS Accounts for Crypto Mining

johny899

Member
Content Writer
Messages
1,068
Reaction score
3
Points
43
Balance
$121.0USD
Did you know hackers could obtain a cloud account and profit from it without anyone knowing? Well, Amazon recently discovered that hackers used stolen AWS Accounts to mine Cryptocurrency. That's nuts!

So, what happened?​

Amazon noticed that multiple AWS Accounts had been compromised. Hackers would access these AWS Accounts to mine cryptocurrency. It implies that they are creating digital currency through Amazon servers without permission.

Here's what you should know:
  • Hackers gained unauthorized access to AWS Accounts by using stolen credentials.
  • Hackers gained access to multiple AWS Accounts to gain access to larger computing power to mine cryptocurrency.
  • The hacker attack lasted for a significant time before any user noticed.
This incident serves as a reminder of how important it is to have security with your cloud accounts. Don't underestimate how much a weak password can cost you.

What did Amazon do?​

Amazon acted quickly. They:
  • Closed all hacked AWS Accounts.
  • Stopped all mining activity from the compromised AWS Accounts.
  • Informed customers to check their accounts for any suspicious activity.
Amazon also emphasized that everyone should be using strong, unique passwords and to implement Multi-Factor Authentication (MFA). If you utilize cloud computing services, then MFA is absolutely essential.

The importance of mining attacks​

Although mining attacks typically do not vanish your data, they are still beneficial to companies in many instances. For example:
  • They can waste money by using excessive amounts of cloud storage.
  • They can reduce an organization's standard operations on their servers.
  • They may lead to even larger attacks if malicious actors are able to capture more access points.
It is important for all customers of AWS and other similar providers to protect their accounts, as well as their login credentials.

Conclusion​

Hackers continually devise new methods to exploit an organization's monetary resources. No one is immune to theft, including businesses that operate in the cloud, unless security measures are implemented. It is recommended that you immediately verify your security measures to ensure that your business remains safe from hackers.
 
Top