← Back to Blog
Threat Intelligence2022

Cryptojacking Cloud Network Bandwidth

By Assaf Morag

Research reveals how threat actors are hijacking cloud network bandwidth for malicious purposes, including cryptojacking and resource abuse. This represents an evolution in cryptojacking techniques, moving beyond CPU and GPU resources to exploit network infrastructure.

Attackers are leveraging misconfigured cloud services and containerized environments to hijack network bandwidth, causing significant costs and performance degradation for affected organizations.

Attack Vectors

  • Exploitation of exposed cloud services
  • Container escape to access host network
  • Bandwidth hijacking for cryptomining operations
  • Resource abuse leading to increased cloud costs