Alibaba Cloud servers hacked to mine Monero cryptocurrency

Cybercriminals have begun targeting servers running on Alibaba Cloud in an attempt to use them to mine for cryptocurrency . Cryptojacking...

Cybercriminals have begun targeting servers running on Alibaba Cloud in an attempt to use them to mine for cryptocurrency.

Cryptojacking, in which an attacker takes over an organization's servers to mine for cryptocurrency, is nothing new but Trend Micro has noticed that cybercriminals are increasingly targeting Alibaba's cloud infrastructure to mine for Monero as it is untraceable.

Alibaba Elastic Computing Service (ECS) instances are of particular value to cybercriminals since they have an auto scaling feature that allows the service to automatically adjust computing resources based on the volume of user requests according to a new report from the cybersecurity firm. Although this feature is provided to Alibaba's customers at no additional cost, the increase in resource usage ultimately leads to additional charges for its customers.

The cryptojacking landscape is shared by multiple threat actors including Kinsing and TeamTNT though their code shares common characteristics such as the ability to remove competing actors who are also mining for cryptocurrency and to disable security features found on the victim machine.

Targeting Alibaba ECS instances

Alibaba ECS instances come with a preinstalled security agent which cybercriminals often try to immediately disable after gaining access to a customer's server. 

During its recent investigation, Trend Micro found a specific code in the malware used by the attackers to create firewall rules to drop incoming packets from IP ranges belonging to internal Alibaba zones and regions. At the same time, the default Alibaba ECS instance provides root access which makes it much easier for cybercriminals to use its cloud servers for cryptojacking.

With the highest possible privilege already available upon compromise, an attacker can deploy advanced payloads such as kernel module rootkits and achieve persistence on a victim's Alibaba ECS instance. This could be one of the reasons cybercriminals have begun to specifically target the Chinese company's cloud computing service over competitors such as AWS or Microsoft Azure.

For organizations using Alibaba Cloud, Trend Micro recommends that they practice a shared responsibility model where CSPs and users have a responsibility to ensure the security configurations of workloads, projects and environments, customize the security features of cloud projects and workloads and follow the principle of least privilege where the number of users with the highest access privileges are limited.

Also check out the best endpoint protection software, best cloud firewall and best malware removal software

from TechRadar - All the latest technology news https://ift.tt/3qKS2i7



Apps,3855,Business,148,Camera,1154,Earn $$$,1,Gadgets,1739,Games,924,Innovations,1,Mobile,1695,Paid Promotions,3,Promotions,3,Technology,7934,Trailers,795,Travel,36,Trendly News,22765,Video,4,XIAOMI,12,
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Alibaba Cloud servers hacked to mine Monero cryptocurrency
Alibaba Cloud servers hacked to mine Monero cryptocurrency
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy