Cybersecurity Alert: 1,926 test apps exposed to the cloud become a gateway for cryptominery and persistent attacks

Published 5 min de lectura 164 reading

Recently, security researchers detected a common sense failure with real consequences: web applications designed for training and testing - such as DVWA, OWASP Juice Shop, Hackazon or bWAPP - were accessible from the Internet on cloud accounts with high privileges, and the attackers soon took advantage of it. What is used in many teams to teach hacking techniques or validate controls was exposed as a back door to productive environments in suppliers such as AWS, Google Cloud and Azure.

The finding, documented by the Pentera laboratories and collected by specialized means, reveals that there were hundreds and hundreds of living instances of these deliberately vulnerable applications published on the public network. According to the investigation data, they were located close to 1,926 test applications exposed, and a significant proportion of them announced cloud credentials or was accompanied by roles with excessive privileges, breaking the basic rule of "minor privilege." You can check the researchers' work on the Pentera laboratories page: Pentera Labs and the journalistic follow-up in BleepingComputer.

Cybersecurity Alert: 1,926 test apps exposed to the cloud become a gateway for cryptominery and persistent attacks
Image generated with IA.

This is not theory: analysts found evidence of active exploitation. In many instances they checked malicious artifacts - from cryptomoneda miners to webshells - that demonstrated a real commitment. In the set of DVWA instances analyzed, for example, approximately 20% contained traces of malicious activity. The attackers used tools such as XMRig to mine Monero, and deployed mechanisms to stay in the affected machines, including a persistence script that restored itself and downloaded the mine from public repositories. The XMRig project is publicly documented in its repository: XMRig in GitHub.

In addition to mining, documented incidents included the installation of a PHP webshell called filemanager.php that allowed to read, write, delete, download and run commands on the system. The webshell code kept embossed credentials and, curiously, had the time zone adjusted to Europe / Minsk, a detail that the researchers pointed out as possible evidence of the origin of the operators.

How did you get to this? In many cases the test applications were implemented in cloud accounts associated with roles with extensive permissions, without applying the principle of minor privilege, and maintained credentials by default or without rotation. In other words, three classic errors were combined: exposing an Internet testing environment, not restricting cloud access and not managing credentials correctly. The credentials found by the investigators could have allowed an attacker to read and write in object stores such as S3, GCS or Azure Blob, access to managed secrets, interact with container records or even climb account administrators.

The companies concerned identified in the study include names recognized between Fortune 500 and security providers, which were notified and proceeded to remedy the incidents following the notice. The episode highlights that even organizations with good practice on many fronts can stumble into the management of non-productive environments.

The practical lesson is simple and urgent: test environments must be treated with at least the same care as systems in production. This is to maintain a complete inventory of resources in the cloud - including laboratories, demos and training machines - and to isolate them from critical environments. It is also essential to apply roles with minimum privileges, change any default credential and set automatic decidencies for temporary resources. Cloud providers maintain detailed guides on good identity management practices and access that should be followed, such as AWS's AMI documentation: Good practice of AMI (AWS), the Google Cloud IAM guide: IAM (Google Cloud) and access control resources in Azure: Azure Active Directory.

In terms of detection and response, typical abuse patterns should be monitored: unusual use of CPU and network (which can report mining), downloads from unusual sites (e.g. public repositories or cloud storage services), creation of persistent processes and presence of files or scripts with base64-coded content. It is also recommended to audit access to secret managers and container image deposits, and to review configuration and deployment log to detect instances that should not be public.

Cybersecurity Alert: 1,926 test apps exposed to the cloud become a gateway for cryptominery and persistent attacks
Image generated with IA.

If your team maintains testing or training environments, reviewing the deployment templates and processes is a priority. Tools and projects designed to teach safety such as DVWA, OWASP Juice Shop or bWAPP are valuable resources, but its use in environments connected to high-privilege accounts without proper controls makes a didactic tool an almost guaranteed risk.

History also leaves a greater warning: security is not just technology, it is operational discipline. Maintaining an inventory, implementing less privileged policies, rotating credentials, automating decidencies and segmenting networks and accounts are basic controls that, when they fail, have tangible consequences. To deepen the nature of these threats and the research behind the finding, you can read the researchers' public materials and follow the specialized coverage of reliable technological media.

In the end, the moral is clear: do not underestimate what a "laboratory" application can do when combined with a cloud account with excessive permissions. What starts as a test environment can end up being the entry path for crypt- min-, malicious persistence or, worse, the jump to sensitive assets of the organization.

Coverage

Related

More news on the same subject.