2026 Futuriom 50: Highlights →Explore

Executive Summary

In November 2025, Amazon Web Services (AWS) became the target of a widespread cryptomining campaign exploiting compromised Identity and Access Management (IAM) credentials. The attackers used stolen keys to access AWS accounts, deploy cryptomining operations, and leverage persistence mechanisms to avoid detection and maintain access. Amazon’s GuardDuty threat detection tools were instrumental in uncovering the activity, which leveraged novel Tactics, Techniques, and Procedures (TTPs) including lateral movement and privilege escalation, putting customer cloud resources and budgets at risk through accelerated resource consumption and possible data exposure.

This incident is emblematic of an escalating trend where threat actors exploit cloud identity weaknesses for financial gain. It underscores the urgent necessity for robust multi-factor authentication, real-time anomaly detection, and comprehensive cloud security strategies as identity-driven attacks proliferate in the cloud era.

Why This Matters Now

Cloud environments are increasingly targeted by attackers leveraging compromised credentials, as seen in this campaign. With the continued growth in cloud adoption, IAM credential security remains a critical concern, and organizations risk major financial and operational disruption if identity-driven threats are not rapidly detected and remediated.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Attackers exploited compromised IAM credentials, enabling lateral movement, cryptomining deployment, and advanced persistence to avoid detection.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Applying CNSF controls such as zero trust segmentation, egress policy enforcement, east-west traffic security, cloud firewalling, threat detection, and centralized visibility would have greatly reduced the ability for adversaries to use compromised credentials, move laterally, and operate cryptomining workloads undetected. These mechanisms disrupt lateral spread, restrict external communications, and surface anomalies for rapid response.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Early detection of unauthorized access attempts using inline enforcement and visibility.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Constrains privilege escalation by enforcing least privilege access boundaries.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Prevents unauthorized internal traffic flows and lateral attacks.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Blocks or alerts on unauthorized outbound traffic to external endpoints.

Exfiltration

Control: Cloud Firewall (ACF)

Mitigation: Detects and prevents external data exfiltration via cloud perimeter controls.

Impact (Mitigations)

Rapid detection and containment of abnormal cloud resource usage.

Impact at a Glance

Affected Business Functions

  • Cloud Infrastructure Management
  • Financial Operations
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

No direct data exposure reported; however, unauthorized access to AWS resources could potentially lead to data breaches if not promptly addressed.

Recommended Actions

  • Enforce zero trust segmentation and least privilege IAM roles to contain blast radius of credential compromise.
  • Implement centralized egress filtering and policy enforcement to disrupt cryptominer command-and-control traffic.
  • Deploy east-west traffic segmentation to prevent lateral movement between cloud workloads and regions.
  • Enable comprehensive threat detection and baselining to surface anomalous resource usage indicative of cryptomining campaigns.
  • Regularly review and audit IAM credential exposure and rotate sensitive access keys to reduce the window of exploitation.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image