Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
TRIPLESTRENGTH: Cloud Account Hijacking and Cryptocurrency Mining via Stolen Credentials

TRIPLESTRENGTH: Cloud Account Hijacking and Cryptocurrency Mining via Stolen Credentials

Type
Campaign
Actors
TRIPLESTRENGTH
Pub. date
January 21, 2025
Initial access
End-user compromise
Impact
Resource hijackingRansomOp
Observed techniques
Credential theftValid creds abuseMFA bypass
Observed tools
PhobosRCRU64LokiLockerunMinerRaccoon stealer
References
https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Status
Finalized
Last edited
Feb 6, 2025 2:18 PM

The threat actor TRIPLESTRENGTH uses stolen credentials and cookies, partially sourced from Racoon infostealer logs, to gain unauthorized access to victim cloud environments. Initially, they exploited legitimate compromised accounts to create compute resources for cryptocurrency mining. Over time, they evolved their tactics, leveraging highly privileged accounts to invite attacker-controlled accounts as billing contacts on victim cloud projects. This allowed them to abuse enhanced billing privileges to deploy extensive compute resources for mining.

Analysis by Google Threat Intelligence Group confirmed their reliance on Racoon infostealer logs for credentials and cookies, granting access to platforms like Google Cloud, Amazon Web Services (AWS), and Linode. Monitoring by Mandiant revealed that TRIPLESTRENGTH affiliates advertise access to servers from prominent providers, including Google Cloud, AWS, Microsoft Azure, Linode, OVHCloud, and DigitalOcean, on Telegram channels.