Threat Intelligence2022
Cryptojacking Cloud Network Bandwidth
By Assaf Morag
Research reveals how threat actors are hijacking cloud network bandwidth for malicious purposes, including cryptojacking and resource abuse. This represents an evolution in cryptojacking techniques, moving beyond CPU and GPU resources to exploit network infrastructure.
Attackers are leveraging misconfigured cloud services and containerized environments to hijack network bandwidth, causing significant costs and performance degradation for affected organizations.
Attack Vectors
- Exploitation of exposed cloud services
- Container escape to access host network
- Bandwidth hijacking for cryptomining operations
- Resource abuse leading to increased cloud costs