The AWS Cryptomining detection identifies suspicious activity where unauthorized instances are used for cryptomining on AWS infrastructure. Cryptomining activity within an AWS account generally indicates that an attacker has gained access to launch high-powered EC2 instances for computationally intensive mining tasks, often incurring high operational costs to the account owner.
Attackers may exploit compromised EC2 instances to perform cryptomining operations, leveraging the AWS account's computational resources for financial gain. Using stolen or misused credentials, attackers can deploy high-powered instances, incurring significant costs that impact the AWS account holder.
Cryptomining tasks may sometimes be mistakenly launched by an authorized application configured to initiate compute-intensive operations in support of legitimate cloud processes. However, such tasks typically align with approved operational needs and do not lead to unauthorized instance launches.
An attacker gains access to an AWS environment using exposed access keys found on a public code repository. The attacker quickly spins up several high-powered EC2 instances to run cryptomining software, consuming large amounts of computational resources and significantly increasing the AWS bill. Security teams notice this through an unexpected rise in resource usage and cost alerts, prompting them to investigate and terminate the unauthorized instances.
A development team inadvertently grants excessive permissions to a service role, allowing it to launch instances at a higher power level than required. A cryptomining script is mistakenly deployed as part of an internal test, consuming extensive AWS resources. The security team detects the unusual behavior through the Vectra detection, reviews the IAM permissions, and revokes unneeded privileges to prevent similar incidents in the future.
If this detection indicates a genuine threat, the organization faces significant risks:
Unauthorized cryptomining consumes high levels of computational resources, driving up unexpected AWS costs that can severely impact budgets.
Cryptomining can exhaust allocated resources, affecting availability and performance for legitimate business applications running in the same environment.
Unauthorized cryptomining often results from compromised credentials, exposing gaps in security controls and potentially increasing the risk of further exploitation.
Check the origin of the EC2 instances and confirm whether they are authorized to create high-powered instances.
Investigate the activities and configurations of newly launched EC2 instances to ensure they serve approved functions.
If unauthorized cryptomining is confirmed, disable the compromised credentials and investigate the source of access. This may include restricting EC2 permissions or setting budget alerts to catch unusual spending early.
This detection indicates potentially unauthorized cryptomining activity on AWS, likely due to compromised credentials or misconfigurations.
Legitimate applications may trigger it if they require high computational power; however, authorized tasks generally match expected usage and align with business needs.
Use least-privilege access for AWS credentials, regularly review IAM permissions, and enable cost alerts to monitor abnormal spending.
High-powered EC2 instance launches and unexpectedly high billing are indicators, often coupled with abnormal compute and network usage.
It leads to unexpected, sometimes extreme costs due to the high-power consumption required by mining software.
Vectra monitors resource-intensive activities and unusual instance launches, particularly those deviating from normal usage patterns, to identify cryptomining behaviors.
Disable any compromised credentials, investigate the source, and terminate unauthorized instances to prevent further unauthorized expenses.
Yes, budget alerts provide an early warning when account spending exceeds typical limits, helping to quickly identify unauthorized cryptomining.
Yes, unauthorized instances could exhaust resource quotas, impacting the availability of legitimate services.
Reviewing CloudTrail and billing logs provides insights into instance creation, credential usage, and billing spikes related to cryptomining.