Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » TRIPLESTRENGTH Goes Cloud for Cryptojacking, Local Systems for Ransomware
Global Security

TRIPLESTRENGTH Goes Cloud for Cryptojacking, Local Systems for Ransomware

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Cryptojacking and Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananCloud Security / Cryptojacking

Cryptocracking and ransomware

Google on Wednesday shed light on a financially motivated threat actor by name TRIPLE POWER for opportunistically targeting cloud environments for cryptojacking and local ransomware attacks.

“This actor engaged in a variety of threats, including cryptocurrency mining operations on compromised cloud resources and ransomware,” the tech giant’s cloud division said in a statement. 11th Threat Horizons Report.

TRIPLESTRENGTH engages in a trio of malicious attacks including illegal cryptocurrency mining, ransomware and extortion, and advertising access to various cloud platforms including Google Cloud, Amazon Web Services, Microsoft Azure, Linode, OVHCloud and Digital Ocean to other entities threats.

Cyber ​​security

Initial access to target cloud instances is facilitated using stolen credentials and cookies, some of which originate from Raccoon information stealer infection logs. The hacked environments are then used to generate computing resources for cryptocurrency mining.

Later versions of the campaign were found to use high-privilege accounts to invite accounts controlled by the attacker as payment contacts in the victim’s cloud project in order to generate large computing resources for mining.

Cryptocurrency mining is done using the unMiner app along with the unMineable mining pool, using CPU and GPU optimized mining algorithms depending on the target system.

Perhaps somewhat unusually, TRIPLESTRENGTH’s ransomware deployment operations have focused on on-premise resources rather than cloud infrastructure, using lockers such as Phobos, RCRU64and LokiLocker.

“On hacking-focused Telegram channels, actors associated with TRIPLESTRENGTH advertised RCRU64 ransomware as a service and solicited partners to cooperate in extortion and blackmail operations,” Google Cloud reported.

In one RCRU64 ransomware incident in May 2024, threat actors are said to have initially gained access via Remote Desktop Protocol, then performed lateral movement and evasion of antivirus protection to run the ransomware on multiple hosts.

Cyber ​​security

TRIPLESTRENGTH was also seen regularly advertising on Telegram for access to hacked servers, including those owned by hosting providers and cloud platforms.

Google said it has taken steps to counter these practices, implementing multi-factor authentication (MFA) to prevent the risk of account hijacking and deploying enhanced logging to flag sensitive billing activities.

“A single stolen account can set off a chain reaction, giving attackers access to applications and data, both on-premises and in the cloud,” the tech giant said.

“This access can then be used to compromise infrastructure using remote access services, manipulate MFA and establish a trusted presence for subsequent social engineering attacks.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.