Hackers are exploiting securing training applications, including open-source projects such as OWASP Juice Shop, DVWA, and Hackazon, to breach the customer managed cloud environments of Fortune 500 companies and security vendors.
More details can be found here: https://pentera.io/press-release/cloud-training-environments-exploited-crypto-miners/
Martin Jartelius, AI Product Director at Outpost24, provided the following comments:
“In security, it is important to refrain from victim blaming. However, when something is designed to be inherently unsafe, deployed as-is, and exposed directly to the internet, it is not even hacking in the traditional sense. Someone simply built a scanner to look for these applications, just as they do for regularly vulnerable ones, and deployed crypto miners.
What can we deduce from this? Attackers go where the value is—and today, that value is primarily in data. When attackers instead revert to deploying miners, it suggests that these systems sit in isolated networks of little value, most likely test beds for tools or teams. Embarrassing, annoying, and somewhat costly—but, even against my own principle of not blaming the victim, this should not come as a surprise to whoever put it there when it happens.”
This illustrates how quickly the bad guys can pivot in terms of finding new and creative ways to pwn their victims. Which means defenders need to find new and creative ways to match those pivots in order to not get pwned.
Like this:
Like Loading...
Related
This entry was posted on January 22, 2026 at 12:20 pm and is filed under Commentary with tags Pentera. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Hackers Exploit Training Apps to Breach Fortune 500 Firms
Hackers are exploiting securing training applications, including open-source projects such as OWASP Juice Shop, DVWA, and Hackazon, to breach the customer managed cloud environments of Fortune 500 companies and security vendors.
More details can be found here: https://pentera.io/press-release/cloud-training-environments-exploited-crypto-miners/
Martin Jartelius, AI Product Director at Outpost24, provided the following comments:
“In security, it is important to refrain from victim blaming. However, when something is designed to be inherently unsafe, deployed as-is, and exposed directly to the internet, it is not even hacking in the traditional sense. Someone simply built a scanner to look for these applications, just as they do for regularly vulnerable ones, and deployed crypto miners.
What can we deduce from this? Attackers go where the value is—and today, that value is primarily in data. When attackers instead revert to deploying miners, it suggests that these systems sit in isolated networks of little value, most likely test beds for tools or teams. Embarrassing, annoying, and somewhat costly—but, even against my own principle of not blaming the victim, this should not come as a surprise to whoever put it there when it happens.”
This illustrates how quickly the bad guys can pivot in terms of finding new and creative ways to pwn their victims. Which means defenders need to find new and creative ways to match those pivots in order to not get pwned.
Share this:
Like this:
Related
This entry was posted on January 22, 2026 at 12:20 pm and is filed under Commentary with tags Pentera. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.