What is cryptomining fraud in Microsoft Azure?
Cryptomining fraud involves unauthorised individuals or groups gaining access to your Azure resources and using them to mine cryptocurrencies without your knowledge or consent. They leverage the processing power of Azure’s high-performance computing resources to perform the complex calculations necessary for cryptocurrency mining, with your organisation responsible for this usage. It’s a stealthy, illegal operation that, if left undetected, can lead to significant and unexpected Azure consumption costs that severely impact your organisation’s ability to operate and deliver services.
The challenges of maintaining your Azure cloud security
Managing your Azure cloud security to reduce the risk of cryptomining fraud in Microsoft Azure often presents several challenges. This is due to the unique characteristics of cloud environments and the evolving nature of cryptomining fraud techniques. Some key challenges include:
Cryptomining fraud techniques constantly evolve to bypass existing security measures. Attackers adapt their code, utilise obfuscation techniques, and leverage new vulnerabilities to evade detection and continue their unauthorised mining activities.
Traditional security measures may struggle to detect cryptomining fraud activities within Azure. The nature of cloud resources and the decentralised architecture make it crucial to have robust monitoring and visibility solutions in place.
Azure environments encompass a vast array of resources, making it challenging to identify and mitigate cryptocurrency fraud incidents effectively. The distributed nature of cloud infrastructure further complicates the detection and prevention process.
Once an organisation’s Azure environment has been compromised, the resources required for cryptomining can be provisioned and up and running in a matter of minutes, with the resulting unauthorised costs being generated immediately.
Addressing these challenges requires a comprehensive approach to combine robust security configuration with monitoring and detection mechanisms, and maintaining up-to-date knowledge of emerging malicious and unauthorised access techniques that could enable cryptomining fraud to be committed.
Real-world impacts and costs of cryptomining fraud
These are recent examples of cryptomining fraud incidents in the UK. Here you can see what happened, the route taken to gain access, and how costly this became for the organisations.
- This organisation was using Azure as part of a hybrid strategy. They had a medium level of adoption and many services running to support their organisation
- A threat actor gained access into their environment using a service account with elevated privileges and no security controls enabled
- Unknown to the organisation, the threat actor used their Azure environment to spin up cryptomining servers across the globe, which were then left running
- By the time it was detected, the bill was already high and the threat actor had covered their tracks and left with the profits
- This resulted in a cost to the organisation of £568,000
- The organisation used Azure to run one business application and would regularly spend between £200 – £300 a month
- This application was developed by a team of developers from a third-party where they would access the Azure environment using a shared service account
- The threat actor gained access into the environment by finding out the username of this account and using an authentication method called ROPC to generate an access token
- The threat actor waited for the current billing period to end and on the first day of the next period used a script to spin up a cryptomining farm – this took four minutes – and managed to leave this running undetected for a few weeks
- This resulted in a cost to the organisation of £60,000
Managing the risk of cryptomining fraud requires a proactive and layered approach, such as regularly reviewing and updating your security controls, staying informed about the latest Azure security best practices, and engaging in ongoing security assessments and monitoring to secure your Azure environment. But is this enough?
Phoenix AzGuardian FAQs
Azure is a cloud computing platform that offers various security features and capabilities to protect the data, applications, and infrastructure hosted on the cloud. However, security is a shared responsibility between Microsoft and the customer, and customers need to follow the best practices and recommendations to prevent or mitigate the impact of common security threats, such as cryptomining fraud.
Phoenix AzGuardian is a managed service that provides comprehensive and proactive security monitoring and management for Azure environments, helping customers improve their security posture, detect, and respond to security incidents, optimise and reduce their costs and risks, and access expert guidance and support from certified Azure specialists.
Cryptomining is the process of using computing power to solve complex mathematical problems and generate new units of cryptocurrency, such as Bitcoin or Ethereum. Cryptomining is not illegal in itself, as long as the miner owns or rents the hardware and software used for the mining operation. However, some threat actors use malicious techniques to compromise and exploit the resources of unsuspecting victims, such as cloud servers, websites, or personal devices, and use them for cryptomining without their consent or knowledge. This is known as cryptomining fraud, and it can have negative consequences for the victims, such as increased costs, reduced performance, degraded service quality, data breaches, and reputational damage. Cryptomining fraud is illegal and unethical, and it poses a serious threat to Azure customers who may not be aware of the unauthorised activity on their cloud environment. Phoenix AzGuardian can help detect and prevent cryptomining fraud attacks on Azure and protect your cloud assets from this emerging threat.