Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Crypto-Mining Risks in Fortune 500 Cloud Systems Revealed

Posted on February 11, 2026 By CWS

Security vulnerabilities in training applications have emerged as a significant risk factor, particularly within major corporate cloud environments. Research from Pentera Labs has highlighted how these intentionally insecure applications, designed for educational purposes, are being mismanaged, leading to potential security breaches.

Vulnerabilities in Cloud Deployments

Applications like OWASP Juice Shop and DVWA are crafted to be insecure for training purposes. However, Pentera Labs has discovered that these are often improperly deployed in real-world cloud environments. Such applications, originally intended for isolated settings, were frequently found exposed to the internet, linked to cloud identities with more access than necessary.

The study revealed that these applications were frequently set up with default settings, insufficient isolation, and excessive cloud permissions. This mismanagement allows attackers to extend their reach beyond the application itself, potentially compromising the broader cloud infrastructure.

Active Exploitation Detected

Pentera Labs’ research uncovered evidence of active exploitation within these vulnerable environments. Approximately 20% of the exposed applications showed signs of malicious activities, such as crypto-mining, webshells, and other persistence tools. These findings illustrate that attackers are not only discovering but actively exploiting these vulnerabilities.

The presence of crypto-mining activities indicates a significant threat, as these tools can severely impact organizational resources and security. The research verified nearly 2,000 exposed instances, with a majority found on infrastructures managed by AWS, Azure, and GCP.

Implications for Major Organizations

The study’s findings are particularly alarming for Fortune 500 companies, where such vulnerabilities were prevalent even among top cybersecurity firms like Palo Alto, F5, and Cloudflare. Despite varying configurations, the common issue was a lack of sufficient security measures for training applications.

Organizations often overlook training and demo environments as low-risk, leading to inadequate security protocols. This negligence allows these environments to become potential entry points for broader attacks.

Conclusion and Recommendations

The Pentera Labs study underscores the critical need for improved security practices in managing training applications. It’s vital to treat these environments with the same security diligence as production systems. Organizations must regularly review access controls, monitor these environments, and enforce strict lifecycle management.

For further insights, refer to the detailed research blog by Pentera Labs, and consider joining their webinar to understand the methodologies and real-world exploitation examples. Addressing these vulnerabilities is crucial to safeguarding cloud infrastructures against potential threats.

The Hacker News Tags:AWS, Azure, cloud environments, cloud identities, cloud security, crypto-mining, cyber threats, Cybersecurity, Exploitation, Fortune 500, GCP, Pentera Labs, security risks, training applications, vulnerable applications

Post navigation

Previous Post: Microsoft’s Critical Windows 11 Updates Enhance Security
Next Post: Data Breach at Conduent Exposes Volvo Group Employees

Related Posts

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts The Hacker News
Critical BeyondTrust Vulnerability Exploited by Hackers Critical BeyondTrust Vulnerability Exploited by Hackers The Hacker News
KadNap Malware Uses Asus Routers for Stealth Botnet KadNap Malware Uses Asus Routers for Stealth Botnet The Hacker News
Scattered Spider Hacker Gets 10 Years, M Restitution for SIM Swapping Crypto Theft Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark