Be Structured Blog Images 2

In A Review of Cryptojacking, we examined how a Cryptojacking attack is launched. Many attacks are now launched towards Cloud based Infrastructures as well, which is the focal point of this blog.


Cryptojacking & The Cloud

It is important to keep in mind that the Cryptojacker is not just out to steal the processing and electrical resources of your individual computer and/or wireless device.  They are also out to attack the overall Cloud Infrastructure, as there are many more resources that can be used to launch even stealthier and more covert Cryptojacking attacks.


A prime example of this is Tesla. They are an auto manufacturing company and have used the Amazon Web Services (AWS) for their Cloud Infrastructure needs.  In this particular instance, they made use of an open source platform available from Google called the “Kubernetes System”.  This is an application which allows for businesses and corporations to completely automate the deployment, scaling, and the management of containerized Cloud based applications.


Tesla had deployed the Kubernetes System onto their AWS Platform, but it was not made secure enough (there was no administrative password that was created and implemented), so various Cryptojackers were able to gain access to their overall AWS Environment. After this was accessed, numerous Cryptojacking mining scripts were then covertly installed onto the particular Kubernetes System instances.


As a result of this, the Cryptojacker was then able to gain 100% control of Tesla’s AWS processing and electrical resources, and then use that to launch multiple Cryptojacking attacks.  They were also able to gain access to sensitive information and data, which were located in Tesla’s AWS Simple Storage Service (S3) buckets.


The Cryptojackers also used other tactics to avoid detection. For example, they made use of private Mining Pool Software packages, which was then utilized to instruct the mining scripts to connect to an unlisted endpoint. By making use of this approach, existing Domain and IPI based threat detection systems could not pick up on the Cryptojacking activities that were taking place.


The Cryptojackers were also able to mask the true IP address of the mining pool by hiding them behind a Content Delivery Network known as “CloudFlare.”  They were even able to make use of nonstandard Network Port Numbers to secretly communicate with the hidden IP addresses.  This is was all done in an effort to keep CPU usage low. This strategy allowed for any type of suspicious network-based traffic to go undetected for long periods of time.


Typically, Cryptojackers have made use of JavaScripts to leverage their attacks.  Now, they are using more advanced techniques such as the exploitation of Zero Day Vulnerabilities and compromising Network Endpoints in order to create Cryptojacking Botnets.  In fact, 80% of organizations that rely upon the AWS or Microsoft Azure to house their IT Infrastructures are at risk of falling victim to a Cryptojacking attack.


Although not using a password (or even a weak one for that matter) can be a major cause for these kinds of attacks, the implementation of very poor-quality API Access Rules also exposes root accounts to be further manipulated in order to launch Crpytojacking attacks.




Our next and final blog in this series will provide various tips and recommendations as to you how you can protect your IT Infrastructure from a Crpytojacking Attack taking place.

34 thoughts on “Cryptojacking – Part 2

  1. Companies need to find ways of securing their cloud infrastructure and their is no better to do that than to use the help of an IT Support..This article us really informative

  2. With the aid of Angeles IT Consulting, I have realized that the Cryptojackers were able to mask the true IP address of the mining pool by hiding them behind a Content Delivery Network known as “CloudFlare.”
    Thanks for this article that teaches about mining.

  3. I have learned a lot about cryptojacking and the IT Services it undertake. I’m looking forward for the part 3.

  4. With the aid of Angeles IT Consulting, I have realized that the Cryptojackers were able to mask the true IP address of the mining pool by hiding them behind a Content Delivery Network known as “CloudFlare.”
    Thanks for this article that teaches about mining.

  5. I admittedly is using cryto currency but not to full extent. I still will depend on real money. However, computer company or not we must be careful. Until further regulations are used for this.

  6. Great information once again from this Los Angeles IT Service provider. It can be very frustrating dealing with hackers and jackers waiting for your tips and recommendations for this.

  7. I am constantly following and reading all your blogs on IT Support. They have opened my eyes so much about the IT related issues.

  8. I have learned so much about cryptojacking and how hackers have been attacking the computer company in so may ways. With the help of the best IT service, one can eventually work it out and stop hackers from pentrating your cloud and protect it at the same time.

  9. Every time I come to this blog I learn something new about cryptocurrency. Be Structured are the best for all your businesses IT Consulting needs.

  10. Trading with cryptocurrency is very delicate given their volatile nature. You need a lot of IT Support
    services to succeed.

  11. It’s upsetting the lengths cryptojackers go into hacking people’s systems, especially a high end business like Tesla. It’s very important to utilize Los Angeles IT Services for company growth and security. I could see it being the future of network stability.

  12. I agree with the notion that these field of currency. However, it is the more reason why IT Support is vial now more than ever. The pros and cons are normal in this.

  13. It is pertinent to use a good IT service to deal with all attackers since they are out to attack the overall Cloud Infrastructure,. Precautions should be taken to avoid more covert Cryptojacking attacks

  14. Cryptojacking is a really terrifying and serious threat. People should always seek professional Los Angeles IT Support when it comes to dealing with problems like that.

  15. Cryptojacking is one IT problem that needs IT Consulting as well. This is one problem that will need the help of experts to fight it to a standstill as well.

  16. This computer company called Be Structured has enlightened me so much about cryptocurrency. I never knew there was something called cryptojacking and how dangerous it can be for your business.

  17. A robust IT support structure is necessary to be able to counter cryptojackers. The attackers get more sophisticated by the day.

  18. Before committing to the cloud, it’s always good to conduct extensive IT consulting. It can go a long way in helping prevent cryptojacking.

  19. When dealing with cloud based services it is good practice to handle things using IT outsourcing. It gives a lot of peace of mind.

  20. Cloud services have become a very popular and sought after IT service. Cryptojacking has also become more extensive in the same measure.

  21. It’s a good idea to entrust your cloud services to a reputable computer company. It’s the sure way of preventing cryptojacking on your network.

  22. I will want to urge all those that need a service like this to outsource it to this IT service company. I’m sure one wouldn’t regret trusting their business to Be Structured.

  23. Los Angeles IT Service can help out with any problem of this nature . The sure thing to do is contact them, the company will help one out.

  24. This is no surprise to me. In this digital age crimes are evolving as well. That said, Los Angeles MSP is giving a great service in securing systems. Good job.

  25. Never knew that cryptojacking can be quite complicated. I learned so much from this. When it comes to these things, I think Los Angeles IT Consulting is a good start. Thanks for sharing!

  26. The example of Tesla being hacked even when using AWS is an eye opener. Before this case it would have been very difficult to see how this can happen. Be Structured offers IT Services that are above the edge, to make sure your business is protected at all times.

  27. Irrespective of the size of your company, cryptojacking of your cloud services threatens your entire IT system. Through IT Outsourcing of services of a company like Be Structured, you can rest assured that your data is safe.

  28. The cloud has really been a place of improvement in the IT world. But there are some vulnerability due to this cryptojackers and others but with a reliable company like Be structured, we can be rest assured of better IT services in terms of security and others.

  29. Every company needs a forward thinking IT support team to be able to tackle the problems of cryptojacking. The attackers get smarter by the day.

  30. IT consulting must be done before migrating to the cloud. It can help prevent a lot of security issues in future.

  31. I believe IT outsourcing is essential in finding the right modus operandi to deal with cryptojacking. The attackers have gotten so sophisticated and so should the businesses.

  32. A good and reputable computer company must be employed to handle clous security for any business. It’s a vital requirement for improved security.

  33. If this is indeed the way of the future??? IT is not surprising if people will jack it as with anything with value these days. However, IT Services must really be vigilant in this. It will put trust in the system more.

Leave a Reply

Your email address will not be published. Required fields are marked *