By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
Computing

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

News Room
Last updated: 2026/02/11 at 7:39 AM
News Room Published 11 February 2026
Share
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
SHARE

The Hacker NewsFeb 11, 2026Identity Security / Threat Exposure

Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as OWASP Juice Shop, DVWA, Hackazon, and bWAPP are designed to be insecure by default, making them useful for learning how common attack techniques work in controlled environments.

The issue is not the applications themselves, but how they are often deployed and maintained in real-world cloud environments.

Pentera Labs examined how training and demo applications are being used across cloud infrastructures and identified a recurring pattern: applications intended for isolated lab use were frequently found exposed to the public internet, running inside active cloud accounts, and connected to cloud identities with broader access than required.

Deployment Patterns Observed in the Research

Pentera Labs research found that these applications were often deployed with default configurations, minimal isolation, and overly permissive cloud roles. The investigation uncovered that many of these exposed training environments were directly connected to active cloud identities and privileged roles, enabling attackers to move far beyond the vulnerable applications themselves and potentially into the customer’s broader cloud infrastructure.

In these scenarios, a single exposed training application can act as an initial foothold. Once attackers are able to leverage connected cloud identities and privileged roles, they are no longer constrained to the original application or host. Instead, they may gain the ability to interact with other resources within the same cloud environment, significantly increasing the scope and potential impact of the compromise.

As part of the investigation, Pentera Labs verified nearly 2,000 live, exposed training application instances, with close to 60% hosted on customer-managed infrastructure running on AWS, Azure, or GCP.

Evidence of Active Exploitation

The exposed training environments identified during the research were not simply misconfigured. Pentera Labs observed clear evidence that attackers were actively exploiting this exposure in the wild.

Across the broader dataset of exposed training applications, approximately 20% of instances were found to contain artifacts deployed by malicious actors, including crypto-mining activity, webshells, and persistence mechanisms. These artifacts indicated prior compromise and ongoing abuse of exposed systems.

The presence of active crypto-mining and persistence tooling demonstrates that exposed training applications are not only discoverable but are already being exploited at scale.

Scope of Impact

The exposed and exploited environments identified during the research were not limited to small or isolated test systems. Pentera Labs observed this deployment pattern across cloud environments associated with Fortune 500 organizations and leading cybersecurity vendors, including Palo Alto, F5, and Cloudflare.

While individual environments varied, the underlying pattern remained consistent: a training or demo application deployed without sufficient isolation, left publicly accessible, and connected to privileged cloud identities.

Why This Matters

Training and demo environments are frequently treated as low-risk or temporary assets. As a result, they are often excluded from standard security monitoring, access reviews, and lifecycle management processes. Over time, these environments may remain exposed long after their original purpose has passed.

The research shows that exploitation does not require zero-day vulnerabilities or advanced attack techniques. Default credentials, known weaknesses, and public exposure were sufficient to turn training applications into an entry point for broader cloud access.

Labeling an environment as “training” or “test” does not reduce its risk. When exposed to the internet and connected to privileged cloud identities, these systems become part of the organization’s effective attack surface.

Refer to the full Pentera Labs research blog & join a live webinar on Feb 12th to learn more about the methodology, discovery process, and real-world exploitation observed during this research. 

This article was written by Noam Yaffe, Senior Security Researcher at Pentera Labs. For questions or discussion, contact [email protected]

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article We’ve Tested Many of the Best Gaming Laptops, and These Are the 6 Best to Buy We’ve Tested Many of the Best Gaming Laptops, and These Are the 6 Best to Buy
Next Article Best HP Deals Best HP Deals
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

British Transport Police launch facial recognition tech trial – UKTN
British Transport Police launch facial recognition tech trial – UKTN
News
Startup founder’s new chapter: A vibe-coded project using human curation and AI to recommend books
Startup founder’s new chapter: A vibe-coded project using human curation and AI to recommend books
Computing
Is Your VPN Really Protecting You? Here’s How to Tell
Is Your VPN Really Protecting You? Here’s How to Tell
News
Linux Mint Developing New Wayland-Compatible Screensaver
Linux Mint Developing New Wayland-Compatible Screensaver
Computing

You Might also Like

Startup founder’s new chapter: A vibe-coded project using human curation and AI to recommend books
Computing

Startup founder’s new chapter: A vibe-coded project using human curation and AI to recommend books

5 Min Read
Linux Mint Developing New Wayland-Compatible Screensaver
Computing

Linux Mint Developing New Wayland-Compatible Screensaver

2 Min Read
Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
Computing

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

3 Min Read
Linux 7.0 Now Defaults To Intel TSX Auto Mode For Performance Benefits On Newer CPUs
Computing

Linux 7.0 Now Defaults To Intel TSX Auto Mode For Performance Benefits On Newer CPUs

2 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?