Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Posted on February 11, 2026 By CWS

Security vulnerabilities in training applications have emerged as a significant risk factor, particularly within major corporate cloud environments. Research from Pentera Labs has highlighted how these intentionally insecure applications, designed for educational purposes, are being mismanaged, leading to potential security breaches.

Vulnerabilities in Cloud Deployments

Applications like OWASP Juice Shop and DVWA are crafted to be insecure for training purposes. However, Pentera Labs has discovered that these are often improperly deployed in real-world cloud environments. Such applications, originally intended for isolated settings, were frequently found exposed to the internet, linked to cloud identities with more access than necessary.

The study revealed that these applications were frequently set up with default settings, insufficient isolation, and excessive cloud permissions. This mismanagement allows attackers to extend their reach beyond the application itself, potentially compromising the broader cloud infrastructure.

Active Exploitation Detected

Pentera Labs’ research uncovered evidence of active exploitation within these vulnerable environments. Approximately 20% of the exposed applications showed signs of malicious activities, such as crypto-mining, webshells, and other persistence tools. These findings illustrate that attackers are not only discovering but actively exploiting these vulnerabilities.

The presence of crypto-mining activities indicates a significant threat, as these tools can severely impact organizational resources and security. The research verified nearly 2,000 exposed instances, with a majority found on infrastructures managed by AWS, Azure, and GCP.

Implications for Major Organizations

The study’s findings are particularly alarming for Fortune 500 companies, where such vulnerabilities were prevalent even among top cybersecurity firms like Palo Alto, F5, and Cloudflare. Despite varying configurations, the common issue was a lack of sufficient security measures for training applications.

Organizations often overlook training and demo environments as low-risk, leading to inadequate security protocols. This negligence allows these environments to become potential entry points for broader attacks.

Conclusion and Recommendations

The Pentera Labs study underscores the critical need for improved security practices in managing training applications. It’s vital to treat these environments with the same security diligence as production systems. Organizations must regularly review access controls, monitor these environments, and enforce strict lifecycle management.

For further insights, refer to the detailed research blog by Pentera Labs, and consider joining their webinar to understand the methodologies and real-world exploitation examples. Addressing these vulnerabilities is crucial to safeguarding cloud infrastructures against potential threats.

The Hacker News Tags:AWS, Azure, cloud environments, cloud identities, cloud security, crypto-mining, cyber threats, Cybersecurity, Exploitation, Fortune 500, GCP, Pentera Labs, security risks, training applications, vulnerable applications

Post navigation

Previous Post: Microsoft’s Critical Windows 11 Updates Enhance Security
Next Post: Data Breach at Conduent Exposes Volvo Group Employees

Related Posts

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware The Hacker News
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The Hacker News
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication The Hacker News
Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar
  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar
  • Security Patches Released by Over 60 Software Vendors
  • GitGuardian Secures $50M to Enhance AI and Security Solutions
  • GitGuardian Secures $50M to Enhance AI Identity Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark