all InfoSec news
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys
Oct. 30, 2023, 11:40 a.m. | William Gamazo and Nathaniel Quist
Unit42 unit42.paloaltonetworks.com
We analyze an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances — which TAs used to perform cryptojacking.
The post CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys appeared first on Unit 42.
air attack attack path aws cloud compute cortex cryptojacking cybercrime elastic exposed exposed credentials exposure github iam keys malicious operations path prisma cloud tracking unit 42
More from unit42.paloaltonetworks.com / Unit42
Jobs in InfoSec / Cybersecurity
Financial Crimes Compliance - Senior - Consulting - Location Open
@ EY | New York City, US, 10001-8604
Software Engineer - Cloud Security
@ Neo4j | Malmö
Security Consultant
@ LRQA | Singapore, Singapore, SG, 119963
Identity Governance Consultant
@ Allianz | Sydney, NSW, AU, 2000
Educator, Cybersecurity
@ Brain Station | Toronto
Principal Security Engineer
@ Hippocratic AI | Palo Alto