New Crypto Mining Campaign Targets AWS via Stolen IAM Credentials

AWS Customers Targeted by Crypto Mining Campaign Exploiting Stolen IAM Credentials with Advanced Persistence Techniques

  • A campaign targets Amazon Web Services (AWS) customers using stolen Identity and Access Management (IAM) credentials to run cryptocurrency mining.
  • The attackers employ new persistence methods, including disabling instance termination to avoid detection and prolong mining activity.
  • The multi-stage attack involves validating permissions using the DryRun flag, creating roles, and launching malicious Docker images for mining across ECS and EC2.
  • The threat actor also creates roles with full access to Amazon Simple Email Service (SES), possibly to conduct phishing campaigns.
  • AWS recommends enforcing strong access controls, using multi-factor authentication, applying least privilege principles, monitoring unusual resource use, and enabling GuardDuty for detection and automated response.

An ongoing campaign discovered on November 2, 2025, targets AWS customers by exploiting compromised Identity and Access Management (IAM) credentials to conduct unauthorized cryptocurrency mining. The threat actor quickly scans the environment after gaining access and deploys crypto mining operations using Elastic Container Service (ECS) and Elastic Compute Cloud (EC2) resources.

- Advertisement -

The attacker begins by using IAM credentials with admin-like permissions to perform a discovery phase. This involves invoking the RunInstances API with the DryRun flag, allowing validation of permissions without launching instances or incurring costs. This step ensures the infrastructure is suitable for mining deployment.

Next, the adversary creates IAM roles through CreateServiceLinkedRole and CreateRole APIs to enable autoscaling groups and AWS Lambda functions. The attacker attaches the AWSLambdaBasicExecutionRole policy to these Lambda roles.

During observed attacks, dozens of ECS clusters were created, sometimes exceeding 50 per incident. The threat actor registers a malicious DockerHub image named yenik65958/secret:user—now removed—which runs a shell script to mine cryptocurrency using the RandomVIREL algorithm. Autoscaling groups scaling between 20 and 999 instances also maximize resource consumption. Both high-performance GPU and general-purpose EC2 instances are targeted.

This campaign uses the ModifyInstanceAttribute action to set the “disableApiTermination” parameter to “True,” preventing affected instances from being terminated via the EC2 console, CLI, or API. This disables common incident response and automated defenses, increasing mining duration. A previous proof-of-concept detailed this method’s risk in April 2024.

- Advertisement -

Additionally, the attacker creates a Lambda function that can be invoked by any principal and an IAM user named “user-x1x2x3x4” with the AmazonSESFullAccess managed policy attached, granting full access to Amazon Simple Email Service (SES). This capability may support phishing campaigns.

To protect against these attacks, AWS advises customers to enforce strong IAM controls, use temporary credentials instead of long-term access keys, enable multi-factor authentication, and apply the principle of least privilege. Additional recommendations include scanning container images for suspicious content, monitoring unusual ECS CPU demands, logging events via AWS CloudTrail, and activating the GuardDuty threat detection service for automated responses.

“The threat actor’s scripted use of multiple compute services, in combination with emerging persistence techniques, represents a significant advancement in crypto mining attack methodologies,” according to AWS on the campaign.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Waymo’s 2026 Expansion Could Drive Big Gains for GOOGL Surge

Alphabet rallied more than 60% in 2025 and enters 2026 with investor optimism tied...

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...
- Advertisement -

Must Read

Sushiswap vs Uniswap, What are the differences between these dex?

It's no secret that the world of decentralized exchanges has exploded in recent years. Many of you are probably wondering what the difference is...
Bitcoin (BTC) $ 90,330.00 2.56%
Ethereum (ETH) $ 3,123.34 4.58%
XRP (XRP) $ 1.99 6.72%
Bittensor (TAO) $ 245.27 8.66%
Polkadot (DOT) $ 2.05 4.86%
Cardano (ADA) $ 0.387428 10.60%
Chainlink (LINK) $ 13.27 6.81%
Hyperliquid (HYPE) $ 24.62 1.05%
Monero (XMR) $ 422.72 0.16%
Hedera (HBAR) $ 0.119882 7.82%
Toncoin (TON) $ 1.90 13.25%