Security

Research

Cryptojackers spread their nets to capture more than just EC2

AMBERSQUID operation takes AWS's paths less travelled in search of compute


As cloud native computing continues to gain popularity, so does the risk posed by criminals seeking to exploit the unwary. One newly spotted method targets services on the AWS platform, but not necessarily the ones you might think.

Researchers from the Sysdig Threat Research Team (TRT) have uncovered a cryptojacking operation dubbed "AMBERSQUID," which does not directly target EC2 instances that would trigger an approval for more resources.

Instead, according to researchers, it is aimed at often-overlooked services, such as AWS Amplify, AWS Fargate, and AWS Sagemaker.

Researchers said: "The uncommon nature of these services means that they are often overlooked from a security perspective, and the AMBERSQUID operation can cost victims more than $10,000 per day."

AMBERSQUID was discovered after more than 1.7 million Linux images were analyzed. A typical static scan didn't show any issues since it was only when the container was run that the nefarious activities became known.

The original container that sparked the investigation was found on Docker Hub, and many accounts started with little more than a basic container image running a cryptominer. Researchers noted: "However, they eventually switched to the AWS-specific services."

The attack comprises a succession of scripts to fire up services such as Amplify, CodeBuild, Sagemaker, and ECS with the aim of using the compute resources on offer to mine cryptocurrency.

The costs can be eyewatering, depending on the amount of resources attackers can utilize. Researchers said: "For the first time, we discover attackers abusing AWS Amplify for cryptojacking."

AWS Amplify is a development platform that allows developers to build and deploy scalable web and mobile applications. Since it opens up a framework to enable an app to integrate with other services on the AWS platform, it also provides a handy avenue for attackers to access the compute resources required for cryptomining.

Researchers suspect, although cannot confirm, that the operation originates from Indonesian attackers due to the use of the Indonesian language in scripts and usernames.

The chaining together of uncommon services in the attack is a novel one. While EC2 is a well-known target, researchers urged security teams to remember that other services also provide access – if indirect – to compute resources, meaning that threat detection needs to be as broad as possible.

If threat detection isn't possible, then a higher level of logging is a must.

It is also essential to consider that while AWS and the services grabbed by attackers through the use of a malicious container image were the subject of this report, users of other platforms need to keep their wits about them.

As the team observed: "While this operation occurred on AWS, other CSPs [Cloud Service Providers] could easily be the next target." ®

Send us news
3 Comments

UK IaaS market: Deeper probe by competition regulator lands soon

Ofcom to refer findings to CMA – which insiders say will home in on egress fees, interoperability and licensing

Obscured by clouds: Time for IaaS vendors to come clean and play fair

All that stuff about resilience, choice, and control? Yeah, we'll take them now please

Winklevoss twins back in hot water after NY AG sues over $1B cryptocurrency fraud

SBF comes up like a bad penny

HTTP/2 'Rapid Reset' zero-day exploited in biggest DDoS deluge seen yet

Botnet storm drowned last record with 398 million requests per second

AWS stirs the MadPot – busting bot baddies and eastern espionage

Security exec Mark Ryland spills the tea on hush-hush threat intel tool

China's top crypto-mining hardware-maker reportedly furloughs staff

Bitmain's 'Antminers' dominate the market – but customers aren't buying

India's AI vision calls for 80 exaFLOPS of infrastructure

Or about half of China's recent compute upgrade plan

Generative AI slashes cloud migration hassles, says McKinsey partner

Bhargs Srivathsan also urges enterprises to ditch the tech Lamborghinis for efficient ride

Blockchain biz goes nuclear: Standard Power wants to use NuScale reactors for DCs

Please, no crypto boom, thank you

US v Sam Bankman-Fried trial begins ... as imploded crypto-biz boss sues his insurer

After people's funds go up in smoke, ex-CEO seeks cash to foot legal bills

Microsoft introduces AI meddling to your files with Copilot in OneDrive

We hope cloud storage service is ready for this web wingman

Microsoft attempts to woo governments with Cloud for Sovereignty preview

Sovereignty = you’ll run on Azure and you’ll be told when our engineers access your resources