Information security
fromThe Hacker News
22 hours agoCompromised IAM Credentials Power a Large AWS Crypto Mining Campaign
Threat actors use compromised AWS IAM credentials and novel persistence methods to deploy widespread crypto-mining across ECS and EC2, evading detection and extending operations.