Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
ScarletEel campaign (Feb ‘23)

ScarletEel campaign (Feb ‘23)

Type
Campaign
Actors
🐍ScarletEel
Pub. date
February 28, 2023
Initial access
Web vulnerability
Impact
Resource hijackingData exfiltration
Observed techniques
Create new cloud userCloud compute cryptojackingDisable loggingIMDS abusePublic exposure abuse
Observed tools
XMRig
Targeted technologies
KubernetesDocker
References
https://sysdig.com/blog/cloud-breach-terraform-data-theft/https://sysdig.com/blog/detect-scarleteel-sysdig-secure/
Status
Finalized
Last edited
Jun 2, 2024 11:57 AM

In early 2023, Sysdig researchers discovered a cyber operation targeting public-facing containerized web apps running in a self-hosted K8s cluster, in order to mine for cryptocurrency and infiltrate the larger cloud environment. The operation, dubbed "SCARLETEEL", involved retrieving credentials for a cluster IAM role and assuming it to enumerate resources, exfiltrate S3 bucket data and steal the source code of Lambda functions.

The observed incident involved an unknown threat actor targeting a vulnerable public-facing service in a self-managed Kubernetes cluster hosted on Amazon Web Services (AWS). While the researchers did not disclose which service was compromised, they went on to describe how the actor gained execution permissions on the container and ran XMRig to mine cryptocurrency. Additionally, the actor queried the Instance Metadata Service (IMDS) to extract credentials for a cluster IAM role.