Even crypto-miners want to move to the cloud

Man tapping a cloud icon
(Image credit: Shutterstock)

Numerous threat actors are reportedly duking it out for access to the limited cloud computing power they can use for cryptocurrency mining activities.

A report by Trend Micro describing, “A floating battleground navigating the landscape of cloud-based cryptocurrency mining”, claims there’s an “hour-by-hour” battle between multiple groups over which gets to use compromised cloud servers as miners.

"Just a few hours of compromise could result in profits for the perpetrators. That's why we're seeing a continuous fight for cloud CPU resources. It's akin to a real-life capture-the-flag, with the victim's cloud infrastructure the battleground," said Stephen Hilt, Senior Threat Researcher at Trend Micro. 

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Increasing costs

"Threats like this need joined-up, platform-based security to ensure the bad guys have nowhere to hide. The right platform will help teams map their attack surface, assess risk, and apply for the right protection without adding excessive overheads."

Compute power in the cloud is excessive, but not all of it is available to cybercrooks. Trend Micro is saying that the groups are only able to exploit exposed instances, which usually have outdated cloud software, poor cloud security hygiene, or are being run by people with inadequate knowledge on how to secure the services.

Brute-forcing SecureShell (SSH) credentials is also sometimes used, the researchers have added.

Cloud computing has proven pivotal for the survival of many businesses during the pandemic. But some have been left online for longer than needed, the report claims, which means they’re now sitting unpatched and misconfigured. 

Compromised systems will not only slow down key user-facing services for targeted organizations, but can also increase their operating costs by up to 600%. After all, a cryptocurrency miner needs significant computing resources as well as electricity, and a stable internet connection. 

Trend Micro also says that some groups use miners as a “side gig”, to earn a few extra bucks as they wait for a customer willing to buy access to the compromised endpoints. 

To remain secure, the researchers advise companies to always keep their systems updated, to run only required services, to deploy firewalls, IDS/IPS, and cloud endpoint security solutions, to eliminate configuration errors, to monitor traffic to and from cloud instances, and to deploy rules that monitor open ports, changes to DNS routing, and utilization of CPU resources from a cost perspective.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Flags of Iran, China, Russia and North Korea on a wall. China North Korea Iran Russia alliance
Cybercrime is helping fund rogue nations across the world - and it's only going to get worse, Google warns
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Huge cybercrime attack sees 390,000 WordPress websites hit, details stolen
Data leak
AWS customers hit by major cyberattack which then stored stolen credentials in plain sight
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Red padlock open on electric circuits network dark red background
CrowdStrike warns of fake job offer scam that is actually just malware
Latest in Pro
The socket interface of the Intel Core Ultra processor
Intel unveils its most powerful AI PCs yet - new Intel Core Ultra Series 2 processors pack in vPro for lightweight laptops and high-performance workstations alike
Webex by Cisco banner on a Chromebook
Cisco warns some Webex users of worrying security flaw, so patch now
Microsoft UK CEO Darren Hardman AI Tour London 2025
Microsoft - UK can help drive the global AI future, but only with the proper buy-in
Red padlock open on electric circuits network dark red background
AI-powered cyber threats are becoming the biggest worry for businesses everywhere
Woman using iMessage on iPhone
Apple to take legal action against British Government over backdoor request
AOC Graphic Pro U32U3CV during our review
I reviewed the AOC Graphic Pro U32U3CV and it's a staggeringly pro-grade monitor for the price
Latest in News
A hand holding a phone showing the Android Find My Device network
Android's Find My Device can now let you track your friends – and I can't decide if that's cool or creepy
Insta360 X4 360 degree camera without lens protector
Leaked DJI Osmo 360 image suggests GoPro and Insta360 should be worried – here's why
A YouTube Premium promo on a laptop screen
A cheaper YouTube Premium Lite plan just rolled out in the US – but you’ll miss out on these 4 features
Viaim RecDot AI true wireless earbuds
These AI-powered earbuds can also act as a dictaphone with transcription when left in their case
The socket interface of the Intel Core Ultra processor
Intel unveils its most powerful AI PCs yet - new Intel Core Ultra Series 2 processors pack in vPro for lightweight laptops and high-performance workstations alike
An Nvidia GeForce RTX 5070
Nvidia confirms that an RTX 5070 Founders Edition is coming... just not on launch day