Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Posted on February 11, 2026 By CWS

Security vulnerabilities in training applications have emerged as a significant risk factor, particularly within major corporate cloud environments. Research from Pentera Labs has highlighted how these intentionally insecure applications, designed for educational purposes, are being mismanaged, leading to potential security breaches.

Vulnerabilities in Cloud Deployments

Applications like OWASP Juice Shop and DVWA are crafted to be insecure for training purposes. However, Pentera Labs has discovered that these are often improperly deployed in real-world cloud environments. Such applications, originally intended for isolated settings, were frequently found exposed to the internet, linked to cloud identities with more access than necessary.

The study revealed that these applications were frequently set up with default settings, insufficient isolation, and excessive cloud permissions. This mismanagement allows attackers to extend their reach beyond the application itself, potentially compromising the broader cloud infrastructure.

Active Exploitation Detected

Pentera Labs’ research uncovered evidence of active exploitation within these vulnerable environments. Approximately 20% of the exposed applications showed signs of malicious activities, such as crypto-mining, webshells, and other persistence tools. These findings illustrate that attackers are not only discovering but actively exploiting these vulnerabilities.

The presence of crypto-mining activities indicates a significant threat, as these tools can severely impact organizational resources and security. The research verified nearly 2,000 exposed instances, with a majority found on infrastructures managed by AWS, Azure, and GCP.

Implications for Major Organizations

The study’s findings are particularly alarming for Fortune 500 companies, where such vulnerabilities were prevalent even among top cybersecurity firms like Palo Alto, F5, and Cloudflare. Despite varying configurations, the common issue was a lack of sufficient security measures for training applications.

Organizations often overlook training and demo environments as low-risk, leading to inadequate security protocols. This negligence allows these environments to become potential entry points for broader attacks.

Conclusion and Recommendations

The Pentera Labs study underscores the critical need for improved security practices in managing training applications. It’s vital to treat these environments with the same security diligence as production systems. Organizations must regularly review access controls, monitor these environments, and enforce strict lifecycle management.

For further insights, refer to the detailed research blog by Pentera Labs, and consider joining their webinar to understand the methodologies and real-world exploitation examples. Addressing these vulnerabilities is crucial to safeguarding cloud infrastructures against potential threats.

The Hacker News Tags:AWS, Azure, cloud environments, cloud identities, cloud security, crypto-mining, cyber threats, Cybersecurity, Exploitation, Fortune 500, GCP, Pentera Labs, security risks, training applications, vulnerable applications

Post navigation

Previous Post: Microsoft’s Critical Windows 11 Updates Enhance Security
Next Post: Data Breach at Conduent Exposes Volvo Group Employees

Related Posts

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns The Hacker News
Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence The Hacker News
Building Cyber Resilience in Financial Services Building Cyber Resilience in Financial Services The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News
Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SSHStalker Botnet Utilizes IRC to Control Legacy Linux Systems
  • Microsoft Addresses Teams Assignment Issues After Update Glitch
  • Data Breach at Conduent Exposes Volvo Group Employees
  • Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed
  • Microsoft’s Critical Windows 11 Updates Enhance Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark