CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

We analyze an attack path starting with GitHub IAM exposure and leading to creation of AWS Elastic Compute instances — which TAs used to perform cryptojacking.

The post CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys appeared first on Unit 42.

This article has been indexed from Unit 42

Read the original article: