Did you know hackers could obtain a cloud account and profit from it without anyone knowing? Well, Amazon recently discovered that hackers used stolen AWS Accounts to mine Cryptocurrency. That's nuts!
Here's what you should know:
So, what happened?
Amazon noticed that multiple AWS Accounts had been compromised. Hackers would access these AWS Accounts to mine cryptocurrency. It implies that they are creating digital currency through Amazon servers without permission.Here's what you should know:
- Hackers gained unauthorized access to AWS Accounts by using stolen credentials.
- Hackers gained access to multiple AWS Accounts to gain access to larger computing power to mine cryptocurrency.
- The hacker attack lasted for a significant time before any user noticed.
What did Amazon do?
Amazon acted quickly. They:- Closed all hacked AWS Accounts.
- Stopped all mining activity from the compromised AWS Accounts.
- Informed customers to check their accounts for any suspicious activity.
The importance of mining attacks
Although mining attacks typically do not vanish your data, they are still beneficial to companies in many instances. For example:- They can waste money by using excessive amounts of cloud storage.
- They can reduce an organization's standard operations on their servers.
- They may lead to even larger attacks if malicious actors are able to capture more access points.