Free cloud dev accounts are being abused for crypto mining

security
(Image credit: Shutterstock / Sashkin)

Criminals have been abusing free cloud accounts on CI/CD providers to mine cryptocurrencies, but the threat campaign holds more than meets the eye, experts have warned.

Cybersecurity researchers from Sysdig uncovered more than 30 GitHub accounts, 2,000 Heroku accounts, and 900 Buddy accounts abused in an activity known as “freejacking” (hijacking free accounts). The researchers dubbed the campaign Purpleurchin, and describe it as an attempt to run cryptominers “in as many environments as possible, as hands off as possible”.

By using free accounts, the cost of mining cryptocurrencies (which is always relatively high) is shifted to the service provider (in this instance, GitHub, Heroku, and Buddy). 

Huge damages

After analyzing the campaign, Sysdig’s researchers estimated that every free GitHub account created by Purpleurchin cost the platform $15 a month. All things considered, it would cost the platform some $100,000 for the threat actor to mine one Monero token (one token is currently worth approximately $150).

But the attackers are not mining Monero just yet. They’re actually trying to mine a bunch of obscure coins, including Tidecoin, Onyx, Surgarchain, Sprint, Yenten, Arionum, MintMe, and Bitweb. Apparently, the entire campaign is hardly profitable.

This has prompted the researchers to believe that all of this is either still an experiment or an attempt to take over the underlying blockchains.

If it’s an experiment, the threat actors are just testing it out to see if the method works, before moving on to more prominent tokens (such as bitcoin or monero). As for attacking the blockchain - proof-of-work networks (on which coins can be “mined”, as opposed to proof-of-stake coins that are all pre-mined) can be taken over by an entity if it can hold 51%+ of the hash power (mining power). That would give that entity the ability to roll the blockchain back, engage in double-spending, and similar. It would also run the token’s price into the ground, though. 

The addresses to which the miners should send the mined tokens are hidden, making it impossible to determine the success of the campaign, or identify the attackers. 

Via: BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Huge cybercrime attack sees 390,000 WordPress websites hit, details stolen
An abstract image of digital security.
Hundreds of GitHub repositories hijacked to trick users into downloading malware
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
A white padlock on a dark digital background.
GitHub is hiding malware disguised as games, legitimate software
Red padlock open on electric circuits network dark red background
CrowdStrike warns of fake job offer scam that is actually just malware
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
Ai tech, businessman show virtual graphic Global Internet connect Chatgpt Chat with AI, Artificial Intelligence.
Nation-state threats are targeting UK AI research
Scam alert
Fake jobs and phone calls: How Americans lost $12.5 bn to fraud in 2024
Application Security Testing Concept with Digital Magnifying Glass Scanning Applications to Detect Vulnerabilities - AST - Process of Making Apps Resistant to Security Threats - 3D Illustration
Google bug bounty payments hit nearly $12 million in 2024
Scam alert
A new SMS energy scam is using Elon Musk’s face to steal your money
Representational image of a cybercriminal
Allstate sued for exposing personal customer information in plaintext
Latest in News
Vision Pro Metallica
Apple Vision Pro goes off to never never land with Metallica concert footage
Mufasa is joined by another lion, a monkey and a bird in this promotional image
Mufasa: The Lion King prowls onto Disney+ as it finally gets a streaming release date
An American flag flying outside the US Capitol building against a blue sky
Sean Plankey selected as CISA director by President Trump
An Nvidia GeForce RTX 4060 on a table with its retail packaging
Nvidia RTX 5060 GPU spotted in Acer gaming PC, suggesting rumors of imminent launch are correct – and that it’ll run with only 8GB of video RAM
Indiana Jones talking to a friend in a university setting with a jaunty smile on his face
New leak claims Indiana Jones and the Great Circle PS5 release will come in April
A close up of the limited edition vinyl turntable wrist watch from AndoAndoAndo
This limited-edition timepiece turns the iconic Technics SL-1200 turntable into a watch, and I want one