Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » TRIPLESTRENGTH Goes Cloud for Cryptojacking, Local Systems for Ransomware
Global Security

TRIPLESTRENGTH Goes Cloud for Cryptojacking, Local Systems for Ransomware

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Cryptojacking and Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananCloud Security / Cryptojacking

Cryptocracking and ransomware

Google on Wednesday shed light on a financially motivated threat actor by name TRIPLE POWER for opportunistically targeting cloud environments for cryptojacking and local ransomware attacks.

“This actor engaged in a variety of threats, including cryptocurrency mining operations on compromised cloud resources and ransomware,” the tech giant’s cloud division said in a statement. 11th Threat Horizons Report.

TRIPLESTRENGTH engages in a trio of malicious attacks including illegal cryptocurrency mining, ransomware and extortion, and advertising access to various cloud platforms including Google Cloud, Amazon Web Services, Microsoft Azure, Linode, OVHCloud and Digital Ocean to other entities threats.

Cyber ​​security

Initial access to target cloud instances is facilitated using stolen credentials and cookies, some of which originate from Raccoon information stealer infection logs. The hacked environments are then used to generate computing resources for cryptocurrency mining.

Later versions of the campaign were found to use high-privilege accounts to invite accounts controlled by the attacker as payment contacts in the victim’s cloud project in order to generate large computing resources for mining.

Cryptocurrency mining is done using the unMiner app along with the unMineable mining pool, using CPU and GPU optimized mining algorithms depending on the target system.

Perhaps somewhat unusually, TRIPLESTRENGTH’s ransomware deployment operations have focused on on-premise resources rather than cloud infrastructure, using lockers such as Phobos, RCRU64and LokiLocker.

“On hacking-focused Telegram channels, actors associated with TRIPLESTRENGTH advertised RCRU64 ransomware as a service and solicited partners to cooperate in extortion and blackmail operations,” Google Cloud reported.

In one RCRU64 ransomware incident in May 2024, threat actors are said to have initially gained access via Remote Desktop Protocol, then performed lateral movement and evasion of antivirus protection to run the ransomware on multiple hosts.

Cyber ​​security

TRIPLESTRENGTH was also seen regularly advertising on Telegram for access to hacked servers, including those owned by hosting providers and cloud platforms.

Google said it has taken steps to counter these practices, implementing multi-factor authentication (MFA) to prevent the risk of account hijacking and deploying enhanced logging to flag sensitive billing activities.

“A single stolen account can set off a chain reaction, giving attackers access to applications and data, both on-premises and in the cloud,” the tech giant said.

“This access can then be used to compromise infrastructure using remote access services, manipulate MFA and establish a trusted presence for subsequent social engineering attacks.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.