Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

The Hacker News by The Hacker News
January 23, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 23, 2025Ravie LakshmananCloud Security / Cryptojacking

Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and on-premise ransomware attacks.

“This actor engaged in a variety of threat activity, including cryptocurrency mining operations on hijacked cloud resources and ransomware activity,” the tech giant’s cloud division said in its 11th Threat Horizons Report.

TRIPLESTRENGTH engages in a trifecta of malicious attacks, including illicit cryptocurrency mining, ransomware and extortion, and advertising access to various cloud platforms, including Google Cloud, Amazon Web Services, Microsoft Azure, Linode, OVHCloud, and Digital Ocean to other threat actors.

Cybersecurity

Initial access to target cloud instances is facilitated by means of stolen credentials and cookies, some of which originate from Raccoon information stealer infection logs. The hijacked environments are then abused to create compute resources for mining cryptocurrencies.

Subsequent versions of the campaign have been found to leverage highly privileged accounts to invite attacker-controlled accounts as billing contacts on the victim’s cloud project in order to set up large compute resources for mining purposes.

The cryptocurrency mining is carried out by using the unMiner application alongside the unMineable mining pool, with both CPU- and GPU-optimized mining algorithms employed depending on the target system.

Perhaps somewhat unusually, TRIPLESTRENGTH’s ransomware deployment operations have been focused on on-premises resources, rather than cloud infrastructure, employing lockers such as Phobos, RCRU64, and LokiLocker.

“In Telegram channels focused on hacking, actors linked to TRIPLESTRENGTH have posted advertisements for RCRU64 ransomware-as-a-service and also solicited partners to collaborate in ransomware and blackmail operations,” Google Cloud said.

In one RCRU64 ransomware incident in May 2024, the threat actors are said to have gained initial access via remote desktop protocol, followed by performing lateral movement and antivirus defense evasion steps to execute the ransomware on several hosts.

Cybersecurity

TRIPLESTRENGTH has also been observed routinely advertising access to compromised servers, including those belonging to hosting providers and cloud platforms, on Telegram.

Google said it has taken steps to counter these activities by enforcing multi-factor authentication (MFA) to prevent the risk of account takeover and rolling out improved logging to flag sensitive billing actions.

“A single stolen credential can initiate a chain reaction, granting attackers access to applications and data, both on-premises and in the cloud,” the tech giant said.

“This access can be further exploited to compromise infrastructure through remote access services, manipulate MFA, and establish a trusted presence for subsequent social engineering attacks.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Data Center Asia and Omdia Collaborate to Deliver Insights on AI Computing in Asia

Data Center Asia and Omdia Collaborate to Deliver Insights on AI Computing in Asia

Recommended.

Billtrust Launches Agentic VoIP, Reducing Collections Call Handling Time by Up to 50%

Billtrust Launches Agentic VoIP, Reducing Collections Call Handling Time by Up to 50%

January 14, 2026
Blue Mantis Acquires Three Vermont MSPs, Adds Telecom, Network Muscle In Northeast Expansion

Blue Mantis Acquires Three Vermont MSPs, Adds Telecom, Network Muscle In Northeast Expansion

March 20, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio