We analyze an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances — which TAs used to perform cryptojacking.
The post CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys appeared first on Unit 42.
This article has been indexed from Unit 42
Read the original article: