2026 Futuriom 50: Highlights →Explore

Executive Summary

In early 2024, threat actors exploited stolen Amazon Web Services (AWS) Identity and Access Management (IAM) credentials to launch an extensive cryptomining campaign. Attackers gained unauthorized access to multiple customer environments, leveraging compromised IAM keys to provision and operate Amazon EC2 instances at scale. This unauthorized infrastructure was then used to mine cryptocurrency, resulting in significant financial losses, increased resource utilization, and additional operational overhead for affected organizations. The incident exposed critical gaps in cloud credential management and highlighted the attackers’ agility in abusing cloud-native services for illicit profit.

This attack underscores a growing trend where cybercriminals are rapidly pivoting to cloud environments, exploiting mismanaged or stolen credentials. As more businesses migrate workloads to multi-cloud platforms, identity-driven threats and cryptojacking incidents are rising, urging organizations to reexamine their cloud security postures and access controls.

Why This Matters Now

With the prevalence of cloud adoption, attackers are prioritizing credential theft to rapidly monetize compromised platforms through cryptomining. This incident exemplifies rising urgency to address identity security, detect abnormal resource usage, and implement least privilege across cloud environments before exploitation can occur.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Threat actors obtained stolen IAM credentials, granting them unauthorized access to Amazon EC2 infrastructure, which they abused for cryptomining.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust segmentation, workload-to-workload controls, and egress policy enforcement would have limited unauthorized movement and blocked malicious payloads from being established or communicating out of the AWS environment. Centralized visibility, threat detection, and granular policy would have hindered both the spread and operational persistence of the cryptomining campaign.

Initial Compromise

Control: Multicloud Visibility & Control

Mitigation: Improved detection of unusual login/access patterns via centralized observability.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Isolation of workload roles to block automatic privilege expansion between identities.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral movements are blocked by granular inter-workload traffic policies.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Outbound connections to unauthorized mining pools or C2 servers are detected and blocked.

Exfiltration

Control: Cloud Firewall (ACF)

Mitigation: Unusual or unapproved outbound data flows are identified and halted.

Impact (Mitigations)

Rapid detection and response to unauthorized resource-consuming activity.

Impact at a Glance

Affected Business Functions

  • Cloud Infrastructure Management
  • Financial Operations
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential exposure of AWS IAM credentials leading to unauthorized access and control over cloud resources.

Recommended Actions

  • Enforce granular least-privilege access and zero trust segmentation to reduce attack surface from compromised identities.
  • Implement east-west microsegmentation to prevent lateral movement across workloads and environments.
  • Apply robust egress filtering and DNS/FQDN controls to block unauthorized C2 and cryptomining destinations.
  • Centralize cloud activity monitoring to enhance detection of anomalous logins, role abuse, and resource usage patterns.
  • Automate incident response using real-time threat detection and distributed policy to disrupt cryptomining and similar attacks early.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image