When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
However, it doesnt work with 100% accuracy, and sometimes keys stay exposed for a bit longer.
They would later use those instances to mine the Monero cryptocurrency.
(Image credit: Shutterstock)
“According to our evidence, they likely did.
We highly recommend that CI/CD security practices, like scanning repos on commit, should be implemented independently.”
After grabbing the keys, the crooks would analyze the account, looking for enabled regions.
After that, they create security groups and launch as many EC2 instances as they can.
Monero is described as a private cryptocurrency, one that is almost impossible to track.
ViaTheRegister