EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat.

By |2023-11-03T19:31:06+00:00November 3, 2023|Amazon, AWS, Cloud, cloud security, cryptomining, CXO, cybersecurity, github, IAM, International, Security, Software, Storage, Uncategorized, Virtualization|Comments Off on EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat.

By |2023-07-14T22:03:20+00:00July 14, 2023|Amazon, AWS, aws fargate, Big Data, Cloud, cloud security, containers, cryptojacking, cryptomining, cybersecurity, data security, kubernetes, malware, Open source, Security, Uncategorized|Comments Off on Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns
Go to Top