A href=httphealth.china.com.cnhmmj target=
The new malware, dubbed 'Denonia' is basically a crypto mining malware. It infects AWS Lambda environments and deploys infectious cryptominers which then automatically mines Monero cryptocurrency.

Malware programs have become an increasingly popular way of compromising systems. This time, cyber criminals are using malware to target advanced cloud infrastructures. Researchers at Cado Security have discovered a piece of malware specifically engineered to target Amazon Web Services (AWS) Lambda cloud environments.
The new malware, dubbed ‘Denonia’ is basically a crypto mining malware. It infects AWS Lambda environments and deploys infectious cryptominers which then automatically mines Monero cryptocurrency. For the uninitiated, AWS Lambda is a computing platform used by more than 8000 companies, which is used to run serverless websites, or for instance automated backups. Mostly, companies that rely on heavy softwares use Amazon’s Lambda web service.
According the researchers, Denonia isn’t being used for anything worse than illicit mining activities, “it demonstrates how attackers are using advanced cloud-specific knowledge to exploit complex cloud infrastructure, and is indicative of potential future, more nefarious attacks,” wrote Cado’s Matt Muir in a blog post.
Crypto mining, essentially, is running set of programs on either high end devices or on cloud-based environments to earn cryptocurrencies.
Researchers found a 64-bit executable sample that is targeting x86-64 systems. This malware is uploaded to VirusTotal in February. In January, they later discovered a second sample uploaded a month earlier, hinting at these attacks spanning at least a couple of months.

“Although this first sample is fairly innocuous in that it only runs crypto-mining software, it demonstrates how attackers are using advanced cloud-specific knowledge to exploit complex cloud infrastructure, and is indicative of potential future, more nefarious attacks,” the Cado researchers said.
It should be noted that Cado researchers weren’t able to find was how the attackers were able to deploy their malware onto compromised environments. However, the researchers suspect that the hackers likely used stolen AWS Access and Secret Keys. “This shows that, while such managed runtime environments decrease the attack surface, misplaced or stolen credentials can lead to massive financial losses quickly due to difficult detection of a potential compromise,” the researchers noted.
“Under the AWS Shared Responsibility model, AWS secures the underlying Lambda execution environment but it is up to the customer to secure functions themselves. We suspect this is likely due to Lambda “serverless” environments using Linux under the hood, so the malware believed it was being run in Lambda (after we manually set the required environment variables) despite being run in our sandbox,” the researchers added.
视力5.3是什么概念 | 人头什么动 | 调剂生是什么意思 | 莲白是什么菜 | 六月初四是什么星座 |
外阴炎用什么药膏 | 移徒是什么意思 | 化肥对人体有什么危害 | 有机玻璃是什么 | 五心烦热是什么症状 |
军犬一般是什么品种 | 八卦是什么生肖 | 三月十八是什么星座 | 右胳膊上长痣代表什么 | 六味地黄丸什么牌子好 |
吃什么降血糖最快 | 过生日送什么礼物好 | 结婚14年是什么婚 | 喝中药不能吃什么东西 | 低骨量是什么意思 |
女人出汗多是什么原因adwl56.com | 店小二是什么意思hcv7jop4ns5r.cn | 工程院院士是什么级别xianpinbao.com | 胆汁反流是什么原因hcv8jop7ns7r.cn | 拔牙后需要注意什么adwl56.com |
蜂蜜什么时候喝比较好qingzhougame.com | 脚上长疣是什么原因hcv9jop1ns8r.cn | 五马分尸是什么意思inbungee.com | 龟龄集适合什么人吃hcv8jop5ns4r.cn | 支气管炎吃什么药有效hcv7jop9ns1r.cn |
痔疮挂什么科hcv9jop7ns4r.cn | 甲亢能吃什么水果hcv9jop1ns7r.cn | 查怀孕挂什么科hcv8jop7ns9r.cn | 指南针是什么时候发明的gysmod.com | 什么是指标到校hcv8jop1ns4r.cn |
鳄鱼为什么流眼泪hcv9jop2ns3r.cn | 子宫内膜异位症有什么症状表现hcv7jop5ns6r.cn | 杯弓蛇影是什么物理现象hcv8jop0ns6r.cn | 台湾有什么特产最有名hcv9jop1ns8r.cn | 什么样的充电宝不能带上飞机hcv9jop8ns1r.cn |