IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Cryptomining criminals are focusing on the cloud

Trend Micro report reveals that cryptomining groups are fighting each other for access to victims' cloud servers

Cloud-based cryptomining has evolved into a vibrant form of cyber crime, and a variety of attack groups are fighting each other for access to cloud accounts. 

Cryptomining groups hack victims' cloud computing accounts, using their computing power to mine cryptocurrency, explained Trend Micro in its latest report. The research, called 'A Floating Battleground: Navigating the Landscape of Cloud-Based Cryptocurrency Mining', warned that victims stand to lose more than the cost of higher cloud computing bills.

Cryptomining attacks either use cloud GPU resources, which offer better mining performance, or compromise CPUs at scale, the report said. The latter requires compromising as many instances in a cloud account as they can to mine as much digital currency as possible.

Trend Micro ran XMRig, which mines the Monero cryptocurrency, on its own cloud instance and saw CPU usage jump from 13% to 100%. That would increase electricity costs from $20 to $130 per month, and running that on multiple instances would spike cloud bills considerably.

While some attack groups use cryptomining as their main source of income, others focus on selling on access to cloud accounts and only mine while they're waiting for a buyer. Groups will often fight each other for cloud resources, using kill scripts to wipe out each others' malware.

The report details several active cryptomining groups. The most active as of August 2021 was called 8220. Trend Micro detected a peak of 2,000 beacons to its servers in July last year, dropping to just over 1,000 the next month.

8220 had taken the top spot from Kinseng, another group which had dropped to around 500 beacons per month in August from 2,000 in January. These two groups often fight each other, ejecting each others' malware from target servers.

Other groups include Outlaw, which consistently targets IoT devices and Linux servers, using brute-force SSH attacks. A rival, TeamTNT, has evolved its tactica quickly by exploiting software services, stealing AWS credentials and deploying root kits. This gang now appears inactive.

A cryptomining attack is a sign of poor cyber security that could render the victim open to more attacks, warned Trend Micro. Most attacks exploit outdated software. Cloud users should ensure that their systems are up to date and only running required services, it said.

Related Resource

Edge-to-cloud security webinar

Safeguards your IoT devices that require Zero Trust

Dark blue webinar screen with orange and light blue circular graphicsWatch now

The report also identified API security as an issue, warning cloud customers not to expose APIs from products such as Docker and Kubernetes to the Internet. Keep them accessible to admins only, it added.

Other mitigating measures includes setting thresholds for metrics like CPU activity and allow lists for external connections.

Large cloud providers have acknowledged the cryptomining problem. Last month, Google added cryptomining protection to its cloud services after widespread infections.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022
Nvidia pauses hiring to help cope with inflation
Careers & training

Nvidia pauses hiring to help cope with inflation

23 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022