Cloud environment of Tesla, the carmaker, was exploited by an attacker to mine cryptocurrencies, RedLock security firm reports in its study “Cloud Security Intelligence (CSI)”. The unsecured Kubernetes console - an open source system used for operation of application containers, virtualised software and cloud-based services - exposed access credentials to Tesla’s Amazon Web Service (AWS) cloud environment, which allowed attackers to inject cryptocurrency mining scripts as well as to reach out to sensitive data such as vehicle telemetry. The study suggests that the unauthorized use of computing power to mine cryptocurrency - known as cryptojacking - is becoming an increasing threat for cloud environments, such as those of Amazon, Microsoft and Google.
The digital currencies story is a continuation of the long-running saga of economics, markets, and commodity exchange in human society. With the constant rise of the global network, we have witnessed many global services becoming widely accepted and in a way changing (by adding to) our experience of mutual interaction.
Cybercrime is crime committed via the Internet and computer systems. One category of cybercrimes are those affecting the confidentiality, integrity and availability of data and computer systems; they include: unauthorised access to computer systems, illegal interception of data transmissions, data interference (damaging, deletion, deterioration, alteration of suppression of data), system interf
Cloud computing could be described as the shift from storing data on hard disks on our computers to servers in the clouds (i.e., huge server farms). Cloud computing offers ubiquitous access to all our data and services from any device anywhere around the world (where there is Internet connection).