Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Denonia campaign

Type
Campaign
Actors
❓Unknown
Pub. date
April 6, 2022
Initial access
Unknown
Impact
Resource hijacking
Observed techniques
DNS-over-HTTPS (DoH)Serverless execution
Observed tools
DenoniaXMRig
Targeted technologies
AWS Lambda
References
https://www.cadosecurity.com/cado-discovers-denonia-the-first-malware-specifically-targeting-lambda/
Status
Finalized
Last edited
Jun 2, 2024 8:02 AM

Denonia is a newly discovered type of malware targeting AWS Lambda environments. It was recently exposed by Cado Security, who named it after the domain it communicates with. Once the malware is executed on the victim's host, it launches XMRig cryptominer.

Denonia's delivery and deployment methods aren't known at the moment, but it is designed to infect Lambda instances, as it uses the aws-lambda-go library to enable execution inside Lambda environments, as well as search for Lambda-related environment variables.

Denonia aims to deliver XMRig, an open-source software intended to mine Monero cryptocurrency. Although XMRig can be used legitimately, malicious actors often weaponize it to run undetected on compromised systems and mine cryptocurrency without consent.

One of the mechanisms used by the malware that helps it avoid detection is DNS over HTTPS (DoH). Whereas traditional DNS queries are unencrypted and can thus be monitored for the presence of malware communication, DoH encrypts all DNS queries and communicates with DNS servers via HTTPS.

Made with 💙 by Wiz

Last Updated: April 3, 2025