Oct. 30, 2023, 11:40 a.m. | William Gamazo and Nathaniel Quist

Unit42 unit42.paloaltonetworks.com

We analyze an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances — which TAs used to perform cryptojacking.


The post CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys appeared first on Unit 42.

air attack attack path aws cloud compute cortex cryptojacking cybercrime elastic exposed exposed credentials exposure github iam keys malicious operations path prisma cloud tracking unit 42

More from unit42.paloaltonetworks.com / Unit42

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto