#ecsec2

[ follow ]
Information security
fromThe Hacker News
16 hours ago

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.
[ Load more ]