Loading...

Crypto mining: The main aim for cloud server cyber-attacks

TL;DR

Aqua Security has been able to conclude after a one-year examination that the majority of cyber attacks launched against cloud servers were intended for secret crypto mining. This signals that hackers are now interested in crypto mining with malware, more than other cyber threats. For this reason, they have diversified and improved their intrusion methods.

Hackers now interested in crypto mining

Aqua Security is a leading pure-play cloud native security firm based in Israel. The cybersecurity computer published a 70-page ‘Threat Report’ on cloud servers, which it began tracking and analyzing from June 2019 and July 2020 on cloud honeypot servers. With about 16,371 attacks analyzed, the company disclosed that hackers are more interested in breaking into cloud servers for crypto mining purposes.

At the beginning of the year, hackers heightened their efforts to break into cloud systems, as the cybersecurity firm noted a 250 percent surge in attacks. During the time, the majority of the hackers’ actions were purported to enable them to gain control of honeypot servers, after which they will try to deploy container images with malware onto the server.

As Aqua Security explained, a greater percentage of those images (about 95 percent) were maligned for crypto mining. Only a few of these images were intended for some other malicious purposes like setting Distributed Denial-of-Service (DDoS) infrastructure.

Hackers are improving their techniques

The company further noted that hackers have been improving their intrusion methods, including malware. They are now using more sophisticated techniques to attack servers which makes it almost impossible to be spotted using a signature-based security system, or through static analysis. 

Head of Team Nautilus at Aqua, Idan Revivo, commented: 

The attacks we observed are a significant step up in attacks targeting cloud native infrastructure. We expect a further increase in sophistication, the use of evasion techniques, and diversity of the attack vectors and objectives, since the widespread use of cloud native technologies makes them a more lucrative target for bad actors.

Security experts have been advised to step up their measures to intercept such attacks.

Share link:

Ibiam Wayas

Ibiam is an optimistic crypto journalist. Five years from now, he sees himself establishing a unique crypto media outlet that will breach the gap between the crypto world and the general public. He loves to associate with like-minded individuals and collaborate with them on similar projects. He spends much of his time honing his writing and critical thinking skills.

Most read

Loading Most Read articles...

Stay on top of crypto news, get daily updates in your inbox

Related News

Paradigm’s Strategic Launch of SEAL-ISAC: Supporting Cryptocurrency Safety
Cryptopolitan
Subscribe to CryptoPolitan